Optimum attack on 3-round Feistel-2 structure
From MaRDI portal
Publication:2128756
Recommendations
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
- New attacks on Feistel structures with improved memory complexities
- Extended meet-in-the-middle attacks on some Feistel constructions
- Meet-in-the-middle attacks on generic Feistel constructions
- Advances in Cryptology – CRYPTO 2004
Cites work
- scientific article; zbMATH DE number 503342 (Why is no real title available?)
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- scientific article; zbMATH DE number 2009979 (Why is no real title available?)
- scientific article; zbMATH DE number 1759791 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Faster Luby-Rackoff ciphers
- Generic key recovery attack on Feistel scheme
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Limitations of the Even-Mansour construction
- Luby-Rackoff Ciphers from Weak Round Functions?
- Mathematics of public key cryptography.
- Monte Carlo Methods for Index Computation (mod p)
- New attacks on Feistel structures with improved memory complexities
- On generalized Feistel networks
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- Security analysis of key-alternating Feistel ciphers
- Slidex attacks on the Even-Mansour encryption scheme
Cited in
(3)
This page was built for publication: Optimum attack on 3-round Feistel-2 structure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2128756)