Feistel Ciphers
From MaRDI portal
Publication:2968538
DOI10.1007/978-3-319-49530-9zbMath1403.94002OpenAlexW4242963565MaRDI QIDQ2968538
Emmanuel Volte, Jacques Patarin, Valérie Nachef
Publication date: 16 March 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-49530-9
DESlinear cryptanalysiscoupling techniqueFeistel ciphersmirror theory\(P_i\oplus P_j\) theoremgeneric attacks on Feistel ciphersH-coefficient methodLuby-Rackoff Theorems
Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items (14)
Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Format-preserving encryption: a survey ⋮ Towards tight security of cascaded LRW2 ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ The Relation Between CENC and NEMO ⋮ How to build optimally secure PRFs using block ciphers ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Tweaking key-alternating Feistel block ciphers ⋮ Three classes of balanced vectorial semi-bent functions
This page was built for publication: Feistel Ciphers