Security Analysis of Key-Alternating Feistel Ciphers
From MaRDI portal
Publication:2946913
DOI10.1007/978-3-662-46706-0_13zbMath1382.94133OpenAlexW2112236948MaRDI QIDQ2946913
Yannick Seurin, Rodolphe Lampe
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46706-0_13
Related Items (15)
The key-dependent message security of key-alternating Feistel ciphers ⋮ Optimum attack on 3-round Feistel-2 structure ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Keyed sum of permutations: a simpler RP-based PRF ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Tweaking key-alternating Feistel block ciphers ⋮ Key alternating ciphers based on involutions ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
This page was built for publication: Security Analysis of Key-Alternating Feistel Ciphers