Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN
From MaRDI portal
Publication:2872047
DOI10.1007/978-3-319-03515-4_9zbMath1295.94033OpenAlexW158895010MaRDI QIDQ2872047
Abhishek Kumar, Donghoon Chang, Somitra Kumar Sanadhya
Publication date: 14 January 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-03515-4_9
block cipherrebound attackactive S-boxknown-key distinguishergeneralized Feistel networkSP-functions
Related Items (2)
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ Simplified MITM modeling for permutations: new (quantum) attacks
This page was built for publication: Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN