Impossible differential attack is one of the most effective cryptanalytic methods for block ciphers. Its key step is to construct impossible differential distinguishers as long as possible. In this paper, we mainly focus on constructing longer impossible differential distinguishers for two kinds of generalized Feistel structures which are m-dataline CAST256-like and MARS-like structures. When their round function takes Substitution Permutation SP and Substitution Permutation Substitution SPS types, they are called CAST256SP/CAST256SPS and MARSSP/MARSSPS, respectively. For CAST256SP/CAST256SPS, the best known result for the length of the impossible differential distinguisher was m2+m/m2+m−1 rounds, respectively. With the help of the linear l...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
Abstract: In this paper, we analyze the security claims of Extended Generalized Feistel Networks (EG...
Generalized Feistel structures are widely used in the design of block ciphers. In this paper, we foc...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Impossible differential cryptanalysis is an important tool for evaluating the security level of a bl...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Abstract. Impossible differential cryptanalysis (IDC) is a variant of differential cryptanalysis (DC...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Abstract. As two important cryptanalytic methods, impossible differential cryptanalysis and integral...
Abstract. This paper reevaluates the security of GF-NLFSR, a new kind of generalized unbalanced Feis...
AbstractThe general strategy of impossible differential cryptanalysis is to first find impossible di...
We improve truncated differential attacks on t-branch contracting Feistel ciphers with a domain size...
In this paper we improve Wu and Wang\u27s method for finding impossible differentials of block ciphe...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
Abstract: In this paper, we analyze the security claims of Extended Generalized Feistel Networks (EG...
Generalized Feistel structures are widely used in the design of block ciphers. In this paper, we foc...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Impossible differential cryptanalysis is an important tool for evaluating the security level of a bl...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Abstract. Impossible differential cryptanalysis (IDC) is a variant of differential cryptanalysis (DC...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Abstract. As two important cryptanalytic methods, impossible differential cryptanalysis and integral...
Abstract. This paper reevaluates the security of GF-NLFSR, a new kind of generalized unbalanced Feis...
AbstractThe general strategy of impossible differential cryptanalysis is to first find impossible di...
We improve truncated differential attacks on t-branch contracting Feistel ciphers with a domain size...
In this paper we improve Wu and Wang\u27s method for finding impossible differentials of block ciphe...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
International audienceWhile generic attacks on classical Feistel schemes and unbalanced Feistel sche...
Abstract: In this paper, we analyze the security claims of Extended Generalized Feistel Networks (EG...