{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:30:09Z","timestamp":1769196609487,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662434130","type":"print"},{"value":"9783662434147","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_15","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"289-305","source":"Crossref","is-referenced-by-count":38,"title":["Extended Generalized Feistel Networks Using Matrix Representation"],"prefix":"10.1007","author":[{"given":"Thierry P.","family":"Berger","sequence":"first","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Ga\u00ebl","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C., Gilchrist, J.: The CAST-256 encryption algorithm. Network Working Group, RFC 2612, June 1999. \n                      http:\/\/tools.ietf.org\/html\/rfc2612\n                      \n                     (1999)","DOI":"10.17487\/rfc2612"},{"key":"15_CR2","series-title":"LNCS","first-page":"39","volume-title":"SAC 2000","author":"K Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"issue":"12","key":"15_CR3","doi-asserted-by":"publisher","first-page":"8095","DOI":"10.1109\/TIT.2011.2164234","volume":"57","author":"F Arnault","year":"2011","unstructured":"Arnault, F., Berger, T.P., Minier, M., Pousse, B.: Revisiting LFSRs for cryptographic applications. IEEE Trans. Info. Theory 57(12), 8095\u20138113 (2011)","journal-title":"IEEE Trans. Info. Theory"},{"key":"15_CR4","series-title":"LNCS","first-page":"12","volume-title":"EUROCRYPT 1999","author":"E Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"15_CR5","series-title":"LNCS","first-page":"2","volume-title":"CRYPTO 1990","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"15_CR6","series-title":"LNCS","first-page":"394","volume-title":"EUROCRYPT 2001","author":"A Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A.: Structural cryptanalysis of SASAS. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 394\u2013405. Springer, Heidelberg (2001)"},{"key":"15_CR7","unstructured":"Burwick, C., Coppersmith, D., D\u2019Avignon, E., Gennaro, R., Halevi, S., Jutla, C., Matyas Jr, S.M., O\u2019Connor, L., Peyravian, M., Stafford, D., Zunic, N.: MARS - a candidate cipher for AES. NIST AES Proposal (1999)"},{"key":"15_CR8","series-title":"LNCS","first-page":"356","volume-title":"EUROCRYPT 1994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995)"},{"key":"15_CR9","unstructured":"FIPS 197. Advanced encryption standard. Federal Information Processing Standards Publication 197, Department of Commerce\/N.I.S.T., U.S. (2001)"},{"key":"15_CR10","series-title":"LNCS","first-page":"248","volume-title":"FSE 2001","author":"H Gilbert","year":"2002","unstructured":"Gilbert, H., Minier, M.: New results on the pseudorandomness of some blockcipher constructions. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 248\u2013266. Springer, Heidelberg (2002)"},{"key":"15_CR11","unstructured":"Hirose, S., Kuwakado, H., Yoshida, H.: SHA-3 Proposal: Lesamnta. \n                      http:\/\/www.hitachi.com\/rd\/yrl\/crypto\/lesamnta\/index.html\n                      \n                     (2008)"},{"key":"15_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/978-3-642-14623-7_33","volume-title":"CRYPTO 2010","author":"VT Hoang","year":"2010","unstructured":"Hoang, V.T., Rogaway, P.: On generalized feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 613\u2013630. Springer, Heidelberg (2010)"},{"key":"15_CR13","series-title":"LNCS","first-page":"46","volume-title":"CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S.H., Lim, J.-I., Lee, S.-J., Koo, B.-S., Lee, C.-H., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J.-S., Chee, S.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"issue":"5","key":"15_CR14","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1016\/j.disc.2009.10.019","volume":"310","author":"J Kim","year":"2010","unstructured":"Kim, J., Hong, S., Lim, J.: Impossible differential cryptanalysis using matrix method. Discrete Math. 310(5), 988\u20131002 (2010)","journal-title":"Discrete Math."},{"key":"15_CR15","series-title":"LNCS","first-page":"112","volume-title":"FSE 2002","author":"LR Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)","journal-title":"SIAM J. Comput."},{"key":"15_CR17","unstructured":"Luo, Y., Wu, Z., Lai, X., Gong, G.: A unified method for finding impossible differentials of block cipher structures. IACR Cryptology ePrint Archive 2009:627 (2009)"},{"key":"15_CR18","series-title":"LNCS","first-page":"386","volume-title":"EUROCRYPT 1993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"15_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-46035-7_8","volume-title":"EUROCRYPT 2002","author":"UM Maurer","year":"2002","unstructured":"Maurer, U.M.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110\u2013132. Springer, Heidelberg (2002)"},{"key":"15_CR20","series-title":"LNCS","first-page":"22","volume-title":"ProvSec 2008","author":"A Mitsuda","year":"2008","unstructured":"Mitsuda, A., Iwata, T.: Tweakable pseudorandom permutation from generalized feistel structure. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 22\u201337. Springer, Heidelberg (2008)"},{"key":"15_CR21","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-44448-3_22","volume-title":"ASIACRYPT 2000","author":"S Moriai","year":"2000","unstructured":"Moriai, S., Vaudenay, S.: On the pseudorandomness of top-level schemes of block ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 289\u2013302. Springer, Heidelberg (2000)"},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M Naor","year":"1999","unstructured":"Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. 12(1), 29\u201366 (1999)","journal-title":"J. Cryptol."},{"key":"15_CR23","unstructured":"National Bureau of Standards: U.S. Department of Commerce. Data Encryption Standard (1977)"},{"key":"15_CR24","series-title":"LNCS","first-page":"91","volume-title":"ASIACRYPT 1996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.:. A description of the RC2(r) encryption algorithm. Network Working Group, RFC 2268, March 1998. \n                      http:\/\/tools.ietf.org\/html\/rfc2268\n                      \n                     (1998)","DOI":"10.17487\/rfc2268"},{"key":"15_CR26","unstructured":"Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 block cipher, august 1998. \n                      http:\/\/people.csail.mit.edu\/rivest\/pubs\/RRSY98.pdf\n                      \n                     (1998)"},{"key":"15_CR27","series-title":"LNCS","first-page":"234","volume-title":"SAC 2012","author":"Y Sasaki","year":"2013","unstructured":"Sasaki, Y., Wang, L.: Meet-in-the-middle technique for integral attacks against feistel ciphers. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 234\u2013251. Springer, Heidelberg (2013)"},{"key":"15_CR28","series-title":"LNCS","first-page":"181","volume-title":"FSE 2007","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"15_CR29","unstructured":"SHS. Secure hash standard. In: FIPS PUB 180\u20134, Federal Information Processing Standards Publication (2012)"},{"key":"15_CR30","series-title":"LNCS","first-page":"19","volume-title":"FSE 2010","author":"T Suzaki","year":"2010","unstructured":"Suzaki, T., Minematsu, K.: Improving the generalized feistel. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 19\u201339. Springer, Heidelberg (2010)"},{"key":"15_CR31","series-title":"LNCS","first-page":"339","volume-title":"SAC 2012","author":"T Suzaki","year":"2013","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339\u2013354. Springer, Heidelberg (2013)"},{"issue":"1","key":"15_CR32","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1587\/transfun.E96.A.2","volume":"96\u2013A","author":"S Yanagihara","year":"2013","unstructured":"Yanagihara, S., Iwata, T.: Improving the permutation layer of Type 1, Type 3, Source-Heavy, and Target-Heavy generalized feistel structures. IEICE Trans. 96\u2013A(1), 2\u201314 (2013)","journal-title":"IEICE Trans."},{"key":"15_CR33","series-title":"LNCS","first-page":"461","volume-title":"CRYPTO 1989","author":"Y Zheng","year":"1990","unstructured":"Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461\u2013480. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:36:48Z","timestamp":1558906608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}