The security of Feistel ciphers with six rounds or less
From MaRDI portal
Publication:1849601
DOI10.1007/S00145-002-9839-YzbMath1013.94014OpenAlexW2082937818MaRDI QIDQ1849601
Publication date: 1 December 2002
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-002-9839-y
cryptanalysispseudorandom functionsFeistel cipherspseudorandom permutationsLuby-Rackoff permutations
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Pseudo-random numbers; Monte Carlo methods (11K45)
Related Items (9)
Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Square reflection cryptanalysis of 5-round Feistel networks with permutations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Generic Attacks on Feistel Networks with Internal Permutations
This page was built for publication: The security of Feistel ciphers with six rounds or less