scientific article; zbMATH DE number 2081068
From MaRDI portal
Publication:4474175
zbMath1064.94550MaRDI QIDQ4474175
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480222.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
pseudo-random permutationsgeneric attacks on encryption schemesFeistel permutationsLuby-Rackoff theory
Related Items (13)
Linear cryptanalysis of FF3-1 and FEA ⋮ Decomposition of permutations in a finite field ⋮ Quantum cryptanalysis of 5 rounds Feistel schemes and Benes schemes ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions ⋮ Algebraic Insights into the Secret Feistel Network ⋮ Generic attacks with standard deviation analysis on a-Feistel schemes ⋮ Deterministic encryption with the Thorp shuffle ⋮ Generic attacks on the Lai-Massey scheme ⋮ Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme ⋮ Three third generation attacks on the format preserving encryption scheme FF3 ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions ⋮ The “Coefficients H” Technique
This page was built for publication: