@article{PDM_2009_10_a11,
author = {M. A. Pudovkina},
title = {On 2-transitivity of generalized {Feistel} ciphers},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {24--26},
year = {2009},
number = {10},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/}
}
M. A. Pudovkina. On 2-transitivity of generalized Feistel ciphers. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 24-26. http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/
[1] Sung J., Lee S., Lim J. et al., “Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis”, Advances in Cryptology – ASIACRYPT 2000, LNCS, 1976, 2000, 274–288 | MR | Zbl
[2] Feistel H., Notz W., “Some cryptographic techniques for machine-to-machine data communications”, Proc. IEEE, 63:11 (1975), 1545–1554 | DOI
[3] Schnorr C. P., “On the construction of random number generators and random function generators”, Advances in Cryptology. Proc. Eurocrypt-88, LNCS, 330, 1988, 225–232 | MR | Zbl
[4] Zheng Y., Matsumoto T., Imai I., “On the construction of block ciphers provably secure and not relying on any unproved hypotheses”, Advances in Cryptology – CRYPTO' 89, LNCS, 435, 1990, 461–480 | Zbl
[5] Moriai S., Vaudenay S., “On the pseudorandomness of top-level schemes of block ciphers”, ASIACRYPT'2000, LNCS, 1976, 2000, 289–302 | MR | Zbl
[6] Schneier B., Kelsey J., “Unbalanced feistel networks and block cipher design”, FSE, 3rd International Workshop, Springer Verlag, 1996, 121–144