Search
Search Results
-
CCA security for contracting (quasi-)Feistel constructions with tight round complexity
Feistel constructions using contracting round functions were introduced in 1990s and generalized by Yun et al. (Des Codes Cryptogr 58(1):45–72, 2011)...
-
Feistel Ciphers Based on a Single Primitive
We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the... -
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
In this paper, we study the security of the Key-Alternating Feistel (KAF) ciphers, a class of key alternating ciphers with the Feistel structure,...
-
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks
Farfalle is a permutation-based construction for building a pseudorandom function which has been proposed by Bertoni et al. in 2017. In this work, we...
-
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked... -
Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion
This paper proposes a bit-level image encryption algorithm based on six-dimensional hyperchaotic system. First, the image is divided into 8 bit-level...
-
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
The Feistel-2 (a.k.a, Feistel-KF) structure is a variant of the Feistel structure such that the i-th round function is given by... -
Automated Meet-in-the-Middle Attack Goes to Feistel
Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and... -
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes
In this paper, we provide new quantum cryptanalysis results on 5 rounds (balanced) Feistel schemes and on Benes schemes. More precisely, we give an... -
SCENERY: a lightweight block cipher based on Feistel structure
In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...
-
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks
Recent works have revisited blockcipher structures to achieve MPC- and ZKP-friendly designs. In particular, Albrecht et al. (EUROCRYPT 2015) first... -
Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks
A generalized Feistel network (GFN) is a classical approach to constructing a blockcipher from pseudorandom functions (PRFs). Recently, Nakaya and... -
Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption
In this work, we will propose a new color image encryption technique using chaotic maps and based on an improved Feistel scheme. This scheme is... -
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box
In this paper, a novel chaos-based dynamic encryption scheme with a permutation-substitution structure is presented. The S-boxes and P-boxes of the...
-
Optimum Attack on 3-Round Feistel-2 Structure
Feistel-2 structure is a variant of Feistel structure such that the... -
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most fundamental binary operations—AND, Rotation and XOR...
-
Quantum Attacks on Lai-Massey Structure
Aaram Yun et al. considered that Lai-Massey structure has the same security as Feistel structure. However, Luo et al. showed that 3-round Lai-Massey... -
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were proposed in the literature, leading... -
Beyond-birthday security for permutation-based Feistel networks
Initiated by Luby and Rackoff (SIAM J. Computing, ’88), the information theoretic security of Feistel networks built upon random functions has been...
-
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC
Recent practical applications using advanced cryptographic protocols such as multi-party computations (MPC) and zero-knowledge proofs (ZKP) have...