Three third generation attacks on the format preserving encryption scheme FF3
From MaRDI portal
Publication:2056726
DOI10.1007/978-3-030-77886-6_5zbMath1479.94111OpenAlexW3139965805MaRDI QIDQ2056726
Orr Dunkelman, Ohad Amon, Adi Shamir, Eyal Ronen, Nathan Keller
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_5
Related Items (3)
Linear cryptanalysis of FF3-1 and FEA ⋮ Format-preserving encryption: a survey ⋮ Targeted invertible pseudorandom functions and deterministic format-transforming encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Breaking the FF3 format-preserving encryption standard over small domains
- Attacks only get better: how to break FF3 on large domains
- Cryptanalysis of Feistel Networks with Secret Round Functions
- Improved Slide Attacks
- A Unified Approach to Related-Key Attacks
- Format-Preserving Encryption
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Ordered Cycle Lengths in a Random Permutation
This page was built for publication: Three third generation attacks on the format preserving encryption scheme FF3