Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
On Generalized Feistel Networks - MaRDI portal

On Generalized Feistel Networks

From MaRDI portal
Publication:3582780

DOI10.1007/978-3-642-14623-7_33zbMath1283.94068OpenAlexW1531988484MaRDI QIDQ3582780

Viet Tung Hoang, Phillip Rogaway

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_33




Related Items (24)

Subquadratic SNARGs in the random oracle modelRelated-key analysis of generalized Feistel networks with expanding round functionsThe key-dependent message security of key-alternating Feistel ciphersOptimum attack on 3-round Feistel-2 structureCollision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueFormat Preserving Sets: On Diffusion Layers of Format Preserving Encryption SchemesTweaking Even-Mansour CiphersBeyond-birthday security for permutation-based Feistel networksQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Tweakable Blockciphers with Asymptotically Optimal SecurityTowards Understanding the Known-Key Security of Block CiphersSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionNew algorithms and analyses for sum-preserving encryptionBBB security for 5-round even-Mansour-based key-alternating Feistel ciphers\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherImproved indifferentiability security proof for 3-round tweakable Luby-RackoffSTEGANOGRAPHIC FILE SYSTEM BASED ON JPEG FILESDeterministic encryption with the Thorp shuffleOn the optimality of non-linear computations for symmetric key primitivesProvable related-key security of contracting Feistel networksMars Attacks! Revisited:Indifferentiability of 8-Round Feistel NetworksFeedback linearly extended discrete functions




This page was built for publication: On Generalized Feistel Networks