Cryptanalysis of Feistel networks with secret round functions
From MaRDI portal
Publication:2807198
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1722688 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 1304130 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- Analysis of involutional ciphers: Khazad and Anubis.
- Block ciphers that are easier to mask: how far can we go?
- Cryptanalysis of Feistel networks with secret round functions
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- New attacks on Feistel structures with improved memory complexities
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Powers of tensors and fast matrix multiplication
- Security analysis of key-alternating Feistel ciphers
- The block cipher \textsc{Square}
Cited in
(17)- scientific article; zbMATH DE number 6280000 (Why is no real title available?)
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- The retracing boomerang attack, with application to reduced-round AES
- Boomerang uniformity of popular S-box constructions
- Generic round-function-recovery attacks for Feistel networks over small domains
- Cryptanalysis of Feistel networks with secret round functions
- Upper Bounds for the Security of Several Feistel Networks
- The retracing boomerang attack
- Some group-theoretical results on Feistel networks in a long-key scenario
- Three third generation attacks on the format preserving encryption scheme FF3
- Multiset structural attack on generalized Feistel networks
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Meet-in-the-middle attacks on generic Feistel constructions
- Algebraic insights into the secret Feistel network
- On the use of conjugacy of substitutions in determining the key in Feistel networks
- Advances in Cryptology – CRYPTO 2004
This page was built for publication: Cryptanalysis of Feistel networks with secret round functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807198)