Generalized Feistel networks revisited

A Bogdanov, K Shibutani - Designs, codes and cryptography, 2013 - Springer
This work deals with the classification, security and efficiency of generalized Feistel
networks (GFNs) with 4 lines. We propose a definition of a GFN, essentially limiting …

Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes

Y Sasaki, K Yasuda - … Encryption: 18th International Workshop, FSE 2011 …, 2011 - Springer
We present new attacks on the Feistel network, where each round function consists of a
subkey XOR, S-boxes, and then a linear transformation (ie, an SP round function). Our …

Fast correlation attacks: Methods and countermeasures

W Meier - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
Fast correlation attacks have considerably evolved since their first appearance. They have
lead to new design criteria of stream ciphers, and have found applications in other areas of …

Differential attacks on generalized Feistel schemes

V Nachef, E Volte, J Patarin - … , CANS 2013, Paraty, Brazil, November 20 …, 2013 - Springer
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have
been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type …

[Књига][B] Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers

A Biryukov, G Gong, DR Stinson - 2011 - books.google.com
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual
International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo …

On the impact of known-key attacks on hash functions

B Mennink, B Preneel - International Conference on the Theory and …, 2015 - Springer
Hash functions are often constructed based on permutations or blockciphers, and security
proofs are typically done in the ideal permutation or cipher model. However, once these …

Impossible differential properties of reduced round Streebog

A Abdelkhalek, R AlTawy, AM Youssef - … 2015, Rabat, Morocco, May 26-28 …, 2015 - Springer
In this paper, we investigate the impossible differential properties of the underlying block
cipher and compression function of the new cryptographic hashing standard of the Russian …

[PDF][PDF] Etudes d'hypotheses algorithmiques et attaques de primitives cryptographiques

C Bouillaguet - 2011 - lip6.fr
Le premier chapitre de cette these reprend intégralement le texte de la brochure Sommes-
nous prisonniers des codes secrets, que j'ai écrite avec Pierre-Alain Fouque, et qui est …

Known-key attacks on generalized Feistel schemes with SP round function

H Kang, D Hong, D Moon, D Kwon… - IEICE Transactions on …, 2012 - search.ieice.org
We present attacks on the generalized Feistel schemes, where each round function consists
of a subkey XOR, S-boxes, and then a linear transformation (ie a Substitution-Permutation …

Analysis of 3-line generalized Feistel networks with double SD-functions

A Bogdanov, K Shibutani - Information processing letters, 2011 - Elsevier
Generalized Feistel networks (GFN) are broadly employed in the design of primitives for
block ciphers, stream ciphers, and hash functions. Lately, endowing the functions of GFNs …