Location & Availability for: Feistel ciphers : security proofs and cr

 Staff view

You must be logged in to Tag Records

Feistel ciphers : security proofs and cryptanalysis /

Valerie Nachef, Jacques Patarin, Emmanuel Volte.

Book Cover
Author: Nachef, Valerie
Other Names: Patarin, Jacques, | Volte, Emmanuel,
Vernacular: 6.2.4 4 Rounds6.2.4.1 NCPA with m2n/2; KPA with q2n; 6.3 Generic Attacks on Ψ5; 6.3.1 NCPA on Ψ5; 6.3.2 KPA on Ψ5; 6.4 Attacks on Ψr Generators, r≥6; 6.4.1 KPA with r Even; 6.4.2 KPA with r Odd; 6.5 Summary of the Best Known Results on Random Feistel Ciphers; 6.6 Conclusion; Problems; References; 7 Generic Attacks on Classical Feistel Ciphers with Internal Permutations; 7.1 Introduction; 7.2 Generic Attacks for a Small Numbers of Rounds (r ≤5); 7.2.1 Generic Attacks on 3-Round Feistel Networks with Internal Permutations; NCPA with 2n/2 Messages; KPA with 2n Messages.
3 The H-Coefficient Method3.1 Six ``H-coefficient'' Theorems; 3.1.1 Notation: Definition of H; 3.1.2 Theorem in KPA; 3.1.3 Theorems in NCPA; 3.1.4 Theorem in CPA; 3.1.5 Theorems in CCA; 3.1.6 Comments about These Theorems; 3.2 How to Distinguish Random functions from Random Permutations; 3.3 Triangular Evaluation on Generic Designs; 3.4 Example: Exact Values of H for Ψr and q=2; 3.5 Two Simple Composition Theorems in CCA; 3.5.1 A Simple Mathematical Property; 3.5.2 A Composition Theorem in CCAwith H-Coefficients; 3.5.3 A Composition Theorem to Eliminate a ``hole''
5.1 Generic Attacks: Distinguishers5.2 2-Point Attacks and φ-Point Attacks and the Variance Method; 5.2.1 General Description of the Attacks; 5.2.2 Distinguishing Attacks; 5.3 Attacks with More Than 2kn Computations; 5.3.1 Attacks on Generators; 5.3.2 Brute Force Attacks; 5.3.3 Attack by the Signature; 5.4 Further Readings; References; 6 Generic Attacks on Classical Feistel Ciphers; 6.1 Introduction; 6.2 Generic Attacks on 1, 2, 3 and 4 Rounds; 6.2.1 1 Round; 6.2.2 2 Rounds; NCPA with q=2 Messages; KPA with m2n/2; 6.2.3 3 Rounds; KPA with q2n/2; CCA with q=3.
3.5.4 Comments about the Composition TheoremsReferences; 4 Luby-Rackoff Theorems; 4.1 Pseudo-Randomness Notions; 4.2 Results on Ψ3; 4.2.1 The ``H-Property of Ψ3; 4.2.2 ``Main Lemma'' of Luby and Racckoff for Ψ3 from the ``H-property''; 4.3 Results on Ψ4; 4.3.1 The ``H-property'' for Ψ4; 4.3.2 ``Main Lemma'' of Luby and Rackoff for Ψ4 from the ``H-property'' of Ψ4; 4.4 Conclusion: Ψ3 is Pseudo-Random, Ψ4 Is Super Pseudo-Random; 4.4.1 Comments about Luby-Rackoff Theorems; 4.5 Other Results; Problems; References; Part II Generic Attacks; 5 Introduction to Cryptanalysis and Generic Attacks.
Published: Cham, Switzerland : Springer, [2017]
Topics: Ciphers. | Cryptography. | COMPUTERS - Security - Cryptography.
Genres: Electronic books.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

Loading Holdings Data ... Loading

Location & Availability for: Feistel ciphers : security proofs and cr