Pseudorandomness analysis of the (extended) Lai-Massey scheme
From MaRDI portal
Publication:1944043
DOI10.1016/j.ipl.2010.10.012zbMath1260.94048OpenAlexW1998608784MaRDI QIDQ1944043
Yiyuan Luo, Xuejia Lai, Zheng Gong
Publication date: 4 April 2013
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2010.10.012
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items (4)
Post-quantum security on the Lai-Massey scheme ⋮ Quantum attacks on Lai-Massey structure ⋮ A unified method for finding impossible differentials of block cipher structures ⋮ Generic attacks on the Lai-Massey scheme
Uses Software
Cites Work
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Selected Areas in Cryptography
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Pseudorandomness analysis of the (extended) Lai-Massey scheme