Square reflection cryptanalysis of 5-round Feistel networks with permutations
From MaRDI portal
Publication:2445261
Recommendations
Cites work
- scientific article; zbMATH DE number 4033663 (Why is no real title available?)
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- scientific article; zbMATH DE number 1418244 (Why is no real title available?)
- scientific article; zbMATH DE number 1440885 (Why is no real title available?)
- A cryptanalytic time-memory trade-off
- Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
- Generic Attacks on Feistel Networks with Internal Permutations
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- On weaknesses of non-surjective round functions
- Reflection Cryptanalysis of Some Ciphers
- The block cipher \textsc{Square}
- The security of Feistel ciphers with six rounds or less
Cited in
(2)
This page was built for publication: Square reflection cryptanalysis of 5-round Feistel networks with permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2445261)