On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses

From MaRDI portal
Publication:3211253

DOI10.1007/0-387-34805-0_42zbMath0722.94020OpenAlexW1830378742WikidataQ56235048 ScholiaQ56235048MaRDI QIDQ3211253

Yuliang Zheng, Tsutomu Matsumoto, Hiroshi Imai

Publication date: 1990

Published in: Advances in Cryptology — CRYPTO’ 89 Proceedings (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/0-387-34805-0_42




Related Items (39)

Related-key analysis of generalized Feistel networks with expanding round functionsVery Compact Hardware Implementations of the Blockcipher CLEFIAOn Quantum Distinguishers for Type-3 Generalized Feistel Network Based on SeparabilityWARP: revisiting GFN for lightweight 128-bit block cipherCollision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueAnalysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphersOn the guaranteed number of activations in $\mathsf{XS}$-circuitsQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Towards Understanding the Known-Key Security of Block CiphersО групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys partsGeneralized Feistel networks revisitedQuantum attacks on generalized Feistel networks based on the strong-weak separabilityKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionLLLWBC: a new low-latency light-weight block cipherCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Applications of Simon's algorithm in quantum attacks on Feistel variantsSimplified MITM modeling for permutations: new (quantum) attacksNew algorithm for exhausting optimal permutations for generalized Feistel networksAnalysis of \(3\)-line generalized Feistel networks with double SD-functionsInvertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsOn unbalanced feistel networks with contracting MDS diffusionThe provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphersRobust Encryption, RevisitedSender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedPseudorandomness of Camellia-like schemeConstruction of MDS matrices from generalized Feistel structuresConstructing Lightweight Optimal Diffusion Primitives with Feistel Structure$\mathsf{XS}$-circuits in block ciphersOn the Diffusion of Generalized Feistel Structures Regarding Differential and Linear CryptanalysisProvable related-key security of contracting Feistel networksBuilding Secure Block Ciphers on Generic Attacks AssumptionsOn the diffusion of the improved generalized FeistelAn Enhanced Differential Cache Attack on CLEFIA for Large Cache LinesUnnamed ItemProvable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structuresUnnamed ItemTweakable Pseudorandom Permutation from Generalized Feistel Structure




This page was built for publication: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses