Square reflection cryptanalysis of 5-round Feistel networks with permutations
From MaRDI portal
Publication:2445261
DOI10.1016/J.IPL.2013.08.001zbMATH Open1285.94073OpenAlexW2068147714MaRDI QIDQ2445261FDOQ2445261
Authors: Orhun Kara
Publication date: 14 April 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2013.08.001
Recommendations
Cites Work
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Title not available (Why is that?)
- The security of Feistel ciphers with six rounds or less
- A cryptanalytic time-memory trade-off
- Reflection Cryptanalysis of Some Ciphers
- The block cipher \textsc{Square}
- Generic Attacks on Feistel Networks with Internal Permutations
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- Title not available (Why is that?)
- On weaknesses of non-surjective round functions
- Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (2)
Uses Software
This page was built for publication: Square reflection cryptanalysis of 5-round Feistel networks with permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2445261)