Zhang, Zhongya; Wu, Wenling; Sui, Han; Li, Xiaodan Quantum generic attacks on key-alternating Feistel ciphers for shorter keys. (English) Zbl 1508.81817 Quantum Inf. Process. 21, No. 6, Paper No. 219, 20 p. (2022). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Quantum Inf. Process. 21, No. 6, Paper No. 219, 20 p. (2022; Zbl 1508.81817) Full Text: DOI
Bossert, Jannis; List, Eik; Lucks, Stefan; Schmitz, Sebastian Pholkos – efficient large-state tweakable block ciphers from the AES round function. (English) Zbl 1492.94067 Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 511-536 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Bossert} et al., Lect. Notes Comput. Sci. 13161, 511--536 (2022; Zbl 1492.94067) Full Text: DOI
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick The Deoxys AEAD family. (English) Zbl 1470.94091 J. Cryptology 34, No. 3, Paper No. 31, 51 p. (2021). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Jean} et al., J. Cryptology 34, No. 3, Paper No. 31, 51 p. (2021; Zbl 1470.94091) Full Text: DOI
Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin Making the impossible possible. (English) Zbl 1421.94041 J. Cryptology 31, No. 1, 101-133 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Boura} et al., J. Cryptology 31, No. 1, 101--133 (2018; Zbl 1421.94041) Full Text: DOI HAL
Hong, Deukjo; Koo, Bonwook; Seo, Changho Differential property of Present-like structure. (English) Zbl 1431.94111 Discrete Appl. Math. 241, 13-24 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Hong} et al., Discrete Appl. Math. 241, 13--24 (2018; Zbl 1431.94111) Full Text: DOI
Nguyen Bui Cuong; Nguyen Van Long; Hoang Dinh Linh Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions. (English) Zbl 1475.94143 Mat. Vopr. Kriptografii 8, No. 1, 51-68 (2017). MSC: 94A60 94D10 PDFBibTeX XMLCite \textit{Nguyen Bui Cuong} et al., Mat. Vopr. Kriptografii 8, No. 1, 51--68 (2017; Zbl 1475.94143) Full Text: DOI MNR
Blondeau, Céline; Nyberg, Kaisa Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. (English) Zbl 1402.94052 Des. Codes Cryptography 82, No. 1-2, 319-349 (2017). MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{C. Blondeau} and \textit{K. Nyberg}, Des. Codes Cryptography 82, No. 1--2, 319--349 (2017; Zbl 1402.94052) Full Text: DOI
Burov, D. A.; Pogorelov, B. A. An attack on 6 rounds of Khazad. (English) Zbl 1475.94107 Mat. Vopr. Kriptografii 7, No. 2, 35-46 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. A. Burov} and \textit{B. A. Pogorelov}, Mat. Vopr. Kriptografii 7, No. 2, 35--46 (2016; Zbl 1475.94107) Full Text: DOI MNR
Jia, Keting; Wang, Ning Impossible differential cryptanalysis of 14-round Camellia-192. (English) Zbl 1346.94106 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 363-378 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Jia} and \textit{N. Wang}, Lect. Notes Comput. Sci. 9723, 363--378 (2016; Zbl 1346.94106) Full Text: DOI
Lin, Li; Wu, Wenling; Zheng, Yafei Improved meet-in-the-middle distinguisher on Feistel schemes. (English) Zbl 1396.94089 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 122-142 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Lin} et al., Lect. Notes Comput. Sci. 9566, 122--142 (2016; Zbl 1396.94089) Full Text: DOI
Dong, Xiaoyang; Li, Leibo; Jia, Keting; Wang, Xiaoyun Improved attacks on reduced-round Camellia-128/192/256. (English) Zbl 1382.94098 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 59-83 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Dong} et al., Lect. Notes Comput. Sci. 9048, 59--83 (2015; Zbl 1382.94098) Full Text: DOI
Wu, Wenling; Zhang, Lei; Yu, Xiaoli The DBlock family of block ciphers. (English) Zbl 1368.94131 Sci. China, Inf. Sci. 58, No. 3, Article ID 032105, 14 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Wu} et al., Sci. China, Inf. Sci. 58, No. 3, Article ID 032105, 14 p. (2015; Zbl 1368.94131) Full Text: DOI Link
Dong, Le; Wu, Wenling; Wu, Shuang; Zou, Jian Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. (English) Zbl 1368.94095 Front. Comput. Sci. 8, No. 3, 513-525 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Dong} et al., Front. Comput. Sci. 8, No. 3, 513--525 (2014; Zbl 1368.94095) Full Text: DOI
Huang, Jialin; Lai, Xuejia What is the effective key length for a block cipher: an attack on every practical block cipher. (English) Zbl 1357.94068 Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Huang} and \textit{X. Lai}, Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014; Zbl 1357.94068) Full Text: DOI Link
Sakallı, Muharrem Tolga; Aslan, Bora On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations. (English) Zbl 1320.94079 J. Comput. Appl. Math. 259 B, 485-494 (2014). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{M. T. Sakallı} and \textit{B. Aslan}, J. Comput. Appl. Math. 259, Part B, 485--494 (2014; Zbl 1320.94079) Full Text: DOI
Shibutani, Kyoji; Bogdanov, Andrey Towards the optimality of Feistel ciphers with substitution-permutation functions. (English) Zbl 1310.94168 Des. Codes Cryptography 73, No. 2, 667-682 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shibutani} and \textit{A. Bogdanov}, Des. Codes Cryptography 73, No. 2, 667--682 (2014; Zbl 1310.94168) Full Text: DOI
Huang, Jialin; Lai, Xuejia Revisiting key schedule’s diffusion in relation with round function’s diffusion. (English) Zbl 1344.94056 Des. Codes Cryptography 73, No. 1, 85-103 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Huang} and \textit{X. Lai}, Des. Codes Cryptography 73, No. 1, 85--103 (2014; Zbl 1344.94056) Full Text: DOI
Shakiba, Mohsen; Dakhilalian, Mohammad; Mala, Hamid On computational complexity of impossible differential cryptanalysis. (English) Zbl 1371.94655 Inf. Process. Lett. 114, No. 5, 252-255 (2014). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{M. Shakiba} et al., Inf. Process. Lett. 114, No. 5, 252--255 (2014; Zbl 1371.94655) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1291.94120 Theor. Comput. Sci. 527, 102-122 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Theor. Comput. Sci. 527, 102--122 (2014; Zbl 1291.94120) Full Text: DOI
Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing Security evaluation of MISTY structure with SPN round function. (English) Zbl 1364.94553 Comput. Math. Appl. 65, No. 9, 1264-1279 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Li} et al., Comput. Math. Appl. 65, No. 9, 1264--1279 (2013; Zbl 1364.94553) Full Text: DOI
Poschmann, Axel; Yap, Huihui Yap; Khoo, Khoongming Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4. (English) Zbl 1307.94087 Int. J. Appl. Cryptogr. 3, No. 1, 1-20 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Poschmann} et al., Int. J. Appl. Cryptogr. 3, No. 1, 1--20 (2013; Zbl 1307.94087) Full Text: DOI
Bogdanov, Andrey; Shibutani, Kyoji Generalized Feistel networks revisited. (English) Zbl 1259.94045 Des. Codes Cryptography 66, No. 1-3, 75-97 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} and \textit{K. Shibutani}, Des. Codes Cryptography 66, No. 1--3, 75--97 (2013; Zbl 1259.94045) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110 Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 7668, 244--264 (2012; Zbl 1295.94110) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Pasalic, Enes; Fouque, Pierre-Alain Meet-in-the-middle attack on reduced versions of the Camellia block cipher. (English) Zbl 1279.94097 Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 197-215 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 7631, 197--215 (2012; Zbl 1279.94097) Full Text: DOI
Gilger, Johannes; Barnickel, Johannes; Meyer, Ulrike GPU-acceleration of block ciphers in the OpenSSL cryptographic library. (English) Zbl 1306.94055 Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 338-353 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Gilger} et al., Lect. Notes Comput. Sci. 7483, 338--353 (2012; Zbl 1306.94055) Full Text: DOI
Wang, Qingju; Bogdanov, Andrey The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. (English) Zbl 1243.94031 Inf. Process. Lett. 112, No. 11, 427-432 (2012). MSC: 94A60 68M10 68P25 PDFBibTeX XMLCite \textit{Q. Wang} and \textit{A. Bogdanov}, Inf. Process. Lett. 112, No. 11, 427--432 (2012; Zbl 1243.94031) Full Text: DOI Link
Sung, Jaechul Differential cryptanalysis of eight-round SEED. (English) Zbl 1260.94056 Inf. Process. Lett. 111, No. 10, 474-478 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Sung}, Inf. Process. Lett. 111, No. 10, 474--478 (2011; Zbl 1260.94056) Full Text: DOI
Choy, Jiali; Chew, Guanhan; Khoo, Khoongming; Yap, Huihui Cryptographic properties and application of a generalized unbalanced Feistel network structure. (English) Zbl 1235.94046 Cryptogr. Commun. 3, No. 3, 141-164 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Choy} et al., Cryptogr. Commun. 3, No. 3, 141--164 (2011; Zbl 1235.94046) Full Text: DOI
Sasaki, Yu; Yasuda, Kan Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. (English) Zbl 1307.94095 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 397-415 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sasaki} and \textit{K. Yasuda}, Lect. Notes Comput. Sci. 6733, 397--415 (2011; Zbl 1307.94095) Full Text: DOI
Wu, Wenling; Zhang, Lei LBlock: a lightweight block cipher. (English) Zbl 1250.94047 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{W. Wu} and \textit{L. Zhang}, Lect. Notes Comput. Sci. 6715, 327--344 (2011; Zbl 1250.94047) Full Text: DOI
Bogdanov, Andrey On the differential and linear efficiency of balanced Feistel networks. (English) Zbl 1234.94030 Inf. Process. Lett. 110, No. 20, 861-866 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov}, Inf. Process. Lett. 110, No. 20, 861--866 (2010; Zbl 1234.94030) Full Text: DOI
Oliynykov, Roman; Gorbenko, Ivan; Dolgov, Viktor; Ruzhentsev, Viktor Results of Ukrainian national public cryptographic competition. (English) Zbl 1287.94093 Tatra Mt. Math. Publ. 47, 99-113 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Oliynykov} et al., Tatra Mt. Math. Publ. 47, 99--113 (2010; Zbl 1287.94093) Full Text: DOI Link
Wu, Wenling; Zhang, Lei; Zhang, Wentao Improved impossible differential cryptanalysis of reduced-round Camellia. (English) Zbl 1256.94069 Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 442-456 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Wu} et al., Lect. Notes Comput. Sci. 5381, 442--456 (2009; Zbl 1256.94069) Full Text: DOI
Wu, Wenling Pseudorandomness of Camellia-like scheme. (English) Zbl 1190.94032 J. Comput. Sci. Technol. 21, No. 1, 82-88 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Wu}, J. Comput. Sci. Technol. 21, No. 1, 82--88 (2006; Zbl 1190.94032) Full Text: DOI
Piret, Gilles Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme. (English) Zbl 1144.94383 Des. Codes Cryptography 39, No. 2, 233-245 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Piret}, Des. Codes Cryptography 39, No. 2, 233--245 (2006; Zbl 1144.94383) Full Text: DOI
Xiao, Lu; Heys, Howard M. A simple power analysis attack against the key schedule of the Camellia block cipher. (English) Zbl 1192.68246 Inf. Process. Lett. 95, No. 3, 409-412 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{L. Xiao} and \textit{H. M. Heys}, Inf. Process. Lett. 95, No. 3, 409--412 (2005; Zbl 1192.68246) Full Text: DOI
Biryukov, Alex; De Cannière, Christophe; Braeken, An; Preneel, Bart A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003). MSC: 94A60 68P25 94A17 PDFBibTeX XMLCite \textit{A. Biryukov} et al., Lect. Notes Comput. Sci. 2656, 33--50 (2003; Zbl 1038.94521) Full Text: Link
Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. (English) Zbl 1062.94554 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 193-207 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Sugita} et al., Lect. Notes Comput. Sci. 2248, 193--207 (2001; Zbl 1062.94554) Full Text: Link