References
- SIAM J. Comput. v.17 How to Construct Pseudorandom Permutations and Pseudorandom Functions Luby, M.;Rackoff, C.
- Advances in Cryptology-Eurocrypt'92, LNCS 658 How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function Patarin, J.
- J. Cryptology v.12 On the Construction of Pseurandom Permutations: Luby-Rackoff Revisited Naor, M.;Reingold, O.
- Fast Software Encryption, LNCS 1039 New Permutation of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis Matsui, M.
- Fast Software Encryption'97, LNCS 1267 New Block Encryption Algorithm MISTY Matsui, M.
- IEICE Trans. Fundamentals v.E80-A no.1 On Non-Pseudorandomness from Block Ciphers with Provable Immunity against Linear Cryptanalysis Sakurai, K.;Zheng, Y.
- FSE 2001, LNCS 2355 New Results on the Pseudorandomness of Some Block Cipher Constructions Gilbert, H.;Minier, M.
- ACISP2001, LNCS 2119 Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI Kang, J.S.;Yi, O.Y.;Hong, D.W.;Cho, H.S.
- FSE2001, LNCS 2355 Round Security and Super-Pseudorandomness of MISTY Type Structure Iwata, T.;Yoshino, T.;Yuasa, T.;Kurosawa, K.
- FSE 2002, LNCS 2365 Non-Cryptographic Primitive for Pseudorandom Permutation Iwata, T.;Yoshino, T.;Kurosawa, K.
- 3G TS 35.201, Specification of the 3GPP Confidentiality and Integrity Algorithm; Document 1: f8 and f9 specifications
- ASIACRYPT 2001, LNCS2248 Provable Security of KASUMI and 3GPP Encryption mode f8 Kang, JS.;Shin, S.U.;Hong, D.W.;Yi, O.Y.
- Advances in Cryptology-Crypto'94, LNCS 839 The Security of Cipher Block Chaining Message Authentication Codes Bellare, M.;Kilian, J.;Rogaway, P.
- 38th Symp. on Foundations of Computer Science (FOCS), IEEE Computer Society A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation Bellare, M.;Desai, A.;Jokipii, E.;Rogaway, P.
- DEAL-A 128-Bit Block Cipher, Technical report 151 Knudsen, L.R.
- ASIACRYPT 2001, LNCS 2248 Generic Attacks on Feistel Schemes Patarin, J.
- 3GDP SAGE, Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms, SAGE version 2.0
- Advances in Cryptology-Eurocrypt 2001, LNCS 2045 Cryptanalysis of Reduced-Round MISTY Kuhn, U.