1 |
E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystem," Journal of Cryptology, vol. 4, no. 1, pp. 3-72, 1991.
DOI
|
2 |
K. Nyberg and L. R. Knudsen, "Provable security against differential cryptanalysis," Journal of Cryptology , vol. 8, no. 1, pp. 27-37, 1995.
DOI
|
3 |
J. Daemen, L. R. Knudsen, and V. Rijmen, "The block cipher square," FSE'97, LNCS 1267, pp. 149-165, 1997.
|
4 |
J. Patarin, "Generic attacks on Feistel schemes," ASIACRYPT'01, LNCS 2248, pp. 222-238, 2001.
|
5 |
I. Dinur, O. Dunkelmann, N. Keller, and A. Shamir, "New attacks on Feistel structures with improved memory complexities," CRYTPO'15, LNCS 9215, pp. 433-454, 2015.
|
6 |
J. Guo, J. Jean, I. Nikolic, and Y. Sasaki, "Extended meet-in-the-middle attacks on some Feistel constructions," Designs, Codes and Cryptography, vol. 80, no. 3, pp. 587-618, 2016.
DOI
|
7 |
J. Guo, J. Jean, I. Nikolic, and Y. Sasaki, "Meet-in-the-middle attacks on generic Feistel constructions," ASIACRYPT'14, LNCS 8873, pp. 439-457, 2014.
|
8 |
V. Hoang and P. Rogaway, "On Generalized Feistel networks," CRYTPO'10, LNCS 6223, pp. 613-630, 2010.
|
9 |
V. Nachef, E.Volte, and J. Patarin, "Differential attacks on generalized Feistel schemes," CANS'13, LNCS 8257, pp. 1-19, 2013.
|
10 |
A. Bogdanov and K,Shibutani, "Generalized Feistel networks revisted," Designs, Codes and Cryptography, vol. 66, no. 1, pp. 75-97, 2013.
DOI
|
11 |
K. Nyberg, "Generalized Feistel Networks," ASIACRYPT'96, LNCS 1163, pp. 491-104, 1996.
|
12 |
H. Feistel, W. Notz, and J. Smith, "Some cryptographic techniques for machine-to-machine data communications," Proc of the IEEE, vol. 63, pp. 1545-1554, 1975.
DOI
|
13 |
M. Luby and C. Rackoff, "How to construct pseudorandom permutations from pseudorandom functions," SIAM Journal Computing, vol. 17, no. 2, pp. 373-386, 1988.
DOI
|
14 |
M. Naor and O. Reingold, "On the construction of pseudorandom permutations : Luby-Rackoff revisited," Journal of Cryptology, vol. 12, no. 1, pp. 29-66, 1999.
DOI
|
15 |
Y. Zheng, T. Matsumoto, and H, Imai, "On the construction of block ciphers provably secure and not relying on any unproved hypotheses," CRYTPO'89, LNCS 435, pp. 461-480, 1989.
|