Meet-in-the-Middle Attacks on Generic Feistel Constructions
From MaRDI portal
Publication:2938859
DOI10.1007/978-3-662-45611-8_24zbMath1306.94058OpenAlexW2164015945MaRDI QIDQ2938859
Ivica Nikolić, Jian Guo, Jérémy Jean, Yu Sasaki
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_24
Related Items (7)
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Uses Software
This page was built for publication: Meet-in-the-Middle Attacks on Generic Feistel Constructions