Optimum attack on 3-round Feistel-2 structure
From MaRDI portal
Publication:2128756
DOI10.1007/978-3-030-85987-9_10zbMath1496.94036OpenAlexW3198054971MaRDI QIDQ2128756
Kaoru Kurosawa, Takanori Daiza
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-85987-9_10
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Slidex attacks on the Even-Mansour encryption scheme
- Generic Key Recovery Attack on Feistel Scheme
- Mathematics of Public Key Cryptography
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Security Analysis of Key-Alternating Feistel Ciphers
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- New Attacks on Feistel Structures with Improved Memory Complexities
- On Generalized Feistel Networks
- Luby-Rackoff Ciphers from Weak Round Functions?
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Monte Carlo Methods for Index Computation (mod p)
- Limitations of the Even-Mansour construction
- Faster Luby-Rackoff ciphers
- Advances in Cryptology – CRYPTO 2004
This page was built for publication: Optimum attack on 3-round Feistel-2 structure