DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yun, Aaram | ko |
dc.contributor.author | Park, Je Hong | ko |
dc.contributor.author | Lee, Jooyoung | ko |
dc.date.accessioned | 2016-09-07T01:09:31Z | - |
dc.date.available | 2016-09-07T01:09:31Z | - |
dc.date.created | 2016-08-09 | - |
dc.date.created | 2016-08-09 | - |
dc.date.created | 2016-08-09 | - |
dc.date.issued | 2011-01 | - |
dc.identifier.citation | DESIGNS CODES AND CRYPTOGRAPHY, v.58, no.1, pp.45 - 72 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | http://hdl.handle.net/10203/212511 | - |
dc.description.abstract | We introduce a new notion called a quasi-Feistel cipher, which is a generalization of the Feistel cipher, and contains the Lai-Massey cipher as an instance. We show that most of the works on the Feistel cipher can be naturally extended to the quasi-Feistel cipher. From this, we give a new proof for Vaudenay's theorems on the security of the Lai-Massey cipher, and also we introduce for Lai-Massey a new construction of pseudorandom permutation, analoguous to the construction of Naor-Reingold using pairwise independent permutations. Also, we prove the birthday security of (2b-1)- and (3b-2)-round unbalanced quasi-Feistel ciphers with b branches against CPA and CPCA attacks, respectively. | - |
dc.language | English | - |
dc.publisher | SPRINGER | - |
dc.title | On Lai-Massey and quasi-Feistel ciphers | - |
dc.type | Article | - |
dc.identifier.wosid | 000286392100005 | - |
dc.identifier.scopusid | 2-s2.0-79551490218 | - |
dc.type.rims | ART | - |
dc.citation.volume | 58 | - |
dc.citation.issue | 1 | - |
dc.citation.beginningpage | 45 | - |
dc.citation.endingpage | 72 | - |
dc.citation.publicationname | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.identifier.doi | 10.1007/s10623-010-9386-8 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
dc.contributor.nonIdAuthor | Yun, Aaram | - |
dc.contributor.nonIdAuthor | Park, Je Hong | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Lai-Massey cipher | - |
dc.subject.keywordAuthor | Feistel cipher | - |
dc.subject.keywordAuthor | Luby-Rackoff | - |
dc.subject.keywordAuthor | Block cipher design | - |
dc.subject.keywordAuthor | Pseudorandom function | - |
dc.subject.keywordAuthor | Indistinguishability | - |
dc.subject.keywordPlus | PSEUDORANDOM PERMUTATIONS | - |
dc.subject.keywordPlus | LUBY-RACKOFF | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | ROUNDS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.