Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_10_a11, author = {M. A. Pudovkina}, title = {On 2-transitivity of generalized {Feistel} ciphers}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {24--26}, publisher = {mathdoc}, number = {10}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/} }
M. A. Pudovkina. On 2-transitivity of generalized Feistel ciphers. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 24-26. http://geodesic.mathdoc.fr/item/PDM_2009_10_a11/
[1] Sung J., Lee S., Lim J. et al., “Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis”, Advances in Cryptology – ASIACRYPT 2000, LNCS, 1976, 2000, 274–288 | MR | Zbl
[2] Feistel H., Notz W., “Some cryptographic techniques for machine-to-machine data communications”, Proc. IEEE, 63:11 (1975), 1545–1554 | DOI
[3] Schnorr C. P., “On the construction of random number generators and random function generators”, Advances in Cryptology. Proc. Eurocrypt-88, LNCS, 330, 1988, 225–232 | MR | Zbl
[4] Zheng Y., Matsumoto T., Imai I., “On the construction of block ciphers provably secure and not relying on any unproved hypotheses”, Advances in Cryptology – CRYPTO' 89, LNCS, 435, 1990, 461–480 | Zbl
[5] Moriai S., Vaudenay S., “On the pseudorandomness of top-level schemes of block ciphers”, ASIACRYPT'2000, LNCS, 1976, 2000, 289–302 | MR | Zbl
[6] Schneier B., Kelsey J., “Unbalanced feistel networks and block cipher design”, FSE, 3rd International Workshop, Springer Verlag, 1996, 121–144