搜索结果: 1-15 共查到“Feistel”相关记录66条 . 查询时间(0.062 秒)
MiMC and GMiMC are families of MPC-friendly block ciphers and hash functions. In this note, we show that the block ciphers MiMC-2n/n2n/n (or Feistel-MiMC) and univariate GMiMC are vulnerable to an att...
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Diffusion Round Feistel Permutations
2019/5/23
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the ...
We study approaches to generalized Feistel constructions with low-degree round functions with a focus on x → x^3. Besides known constructions, we also provide a new balanced Feistel construction...
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Generalized Feistel Scheme Quantum attack Simon's algorithm
2019/4/1
Generalized Feistel Schemes (GFS) are important components of symmetric ciphers, which have been extensively researched in classical setting. However, the security evaluations of GFS in quantum settin...
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Generalized Feistel cipher Simon's algorithm Grover search,
2019/4/1
A generalized Feistel cipher is one of the methods to construct block ciphers, and it has several variants. Dong, Li, and Wang showed quantum distinguishing attacks against the (2d−1)(2d−1...
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Feistel cipher Quantum chosen-ciphertext attacks Simon's algorithm
2018/12/19
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen-ciphertext attacks (CCAs). ...
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
blockcipher provable security multi-user security
2018/11/19
Our results hold in the multi-user setting as well, constituting the first non-trivial multi-user provable security results on Feistel ciphers. We finally demonstrate applications of our results on de...
Construction of Lightweight MDS Matrices from Generalized Feistel Structures
Lightweight cryptography MDS matrix Generalized Feistel Structures
2018/11/12
This paper investigates the construction of lightweight MDS matrices with generalized Feistel structures (GFS). The approach developed by this paper consists in deriving MDS matrices from the product ...
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
MILP Generalized Feistel structure Switching mechanism
2018/8/16
Some features of Feistel structures have caused them to be considered as an efficient structure for design of block ciphers. Although several structures are proposed relied on Feistel structure, the t...
Quantum Attacks on Some Feistel Block Ciphers
Quantum key-recovery attack Symmetric cipher
2018/5/28
Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem due to Shor's attack on RSA and ECC ciphers. At...
Generic Round-Function Recovery for Feistel Networks over Small Domains
feistel networks format-preserving encryption
2018/1/31
Feistel Networks (FN) are now massively being used to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions,...
Quantum Cryptanalysis on Some Generalized Feistel Schemes
Generalized Feistel Schemes Simon Grover
2018/1/2
Post-quantum cryptography has attracted much attention from worldwide cryptologists. In ISIT 2010, Kuwakado and Morii gave a quantum distinguisher with polynomial time against 3-round Feistel networks...
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions
Feistel network Grover's algorithm claw finding algorithm
2017/12/25
This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most power...
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Generalized Feistel Network Differential Analysis Chosen Ciphertext Attack
2017/12/19
Nachef et al used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random perm...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...