Generic Key Recovery Attack on Feistel Scheme
From MaRDI portal
Publication:2867235
DOI10.1007/978-3-642-42033-7_24zbMath1327.94052OpenAlexW207657696MaRDI QIDQ2867235
Takanori Isobe, Kyoji Shibutani
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42033-7_24
block ciphermeet-in-the-middle attackkey recovery attackall-subkeys-recovery attackkey scheduling functionlow-data complexity attack
Related Items (10)
Optimum attack on 3-round Feistel-2 structure ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ New Attacks on Feistel Structures with Improved Memory Complexities ⋮ Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Efficient slide attacks ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Weak rotational property and its application
Uses Software
This page was built for publication: Generic Key Recovery Attack on Feistel Scheme