On 2-transitivity of generalized Feistel ciphers
Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 24-26.

Voir la notice de l'article provenant de la source Math-Net.Ru

Several generalizations of the Feistel scheme are known. In this paper, we introduce a mathematical model including different generalizations of the Feistel scheme. For the described $\upsilon$-generalized Feistel ciphers, we get an accessible lower boundary for the number of rounds under which the 2-transitivity is achieved.
@article{PDM_2009_10_a11,
     author = {M. A. Pudovkina},
     title = {On 2-transitivity of generalized {Feistel} ciphers},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {24--26},
     publisher = {mathdoc},
     number = {10},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/}
}
TY  - JOUR
AU  - M. A. Pudovkina
TI  - On 2-transitivity of generalized Feistel ciphers
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 24
EP  - 26
IS  - 10
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/
LA  - ru
ID  - PDM_2009_10_a11
ER  - 
%0 Journal Article
%A M. A. Pudovkina
%T On 2-transitivity of generalized Feistel ciphers
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 24-26
%N 10
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/
%G ru
%F PDM_2009_10_a11
M. A. Pudovkina. On 2-transitivity of generalized Feistel ciphers. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 24-26. http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/

[1] Sung J., Lee S., Lim J. et al., “Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis”, Advances in Cryptology – ASIACRYPT 2000, LNCS, 1976, 2000, 274–288 | MR | Zbl

[2] Feistel H., Notz W., “Some cryptographic techniques for machine-to-machine data communications”, Proc. IEEE, 63:11 (1975), 1545–1554 | DOI

[3] Schnorr C. P., “On the construction of random number generators and random function generators”, Advances in Cryptology. Proc. Eurocrypt-88, LNCS, 330, 1988, 225–232 | MR | Zbl

[4] Zheng Y., Matsumoto T., Imai I., “On the construction of block ciphers provably secure and not relying on any unproved hypotheses”, Advances in Cryptology – CRYPTO' 89, LNCS, 435, 1990, 461–480 | Zbl

[5] Moriai S., Vaudenay S., “On the pseudorandomness of top-level schemes of block ciphers”, ASIACRYPT'2000, LNCS, 1976, 2000, 289–302 | MR | Zbl

[6] Schneier B., Kelsey J., “Unbalanced feistel networks and block cipher design”, FSE, 3rd International Workshop, Springer Verlag, 1996, 121–144