{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:35Z","timestamp":1767340115178},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,5,1]],"date-time":"2006-05-01T00:00:00Z","timestamp":1146441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2006,5]]},"DOI":"10.1007\/s10623-005-3562-2","type":"journal-article","created":{"date-parts":[[2006,3,20]],"date-time":"2006-03-20T05:42:13Z","timestamp":1142833333000},"page":"233-245","source":"Crossref","is-referenced-by-count":11,"title":["Luby\u2013Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme"],"prefix":"10.1007","volume":"39","author":[{"given":"Gilles","family":"Piret","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3562_CR1","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M.Matsui S. Moriai, J. Nakajima and T.Tokita, Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms\u2014Design and Analysis. In D.R. Stinson and S.E. Tavares (eds.), Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Canada, August 14\u201315, 2000, volume 2012 of Lecture Notes in Computer Science, Springer-Verlag (2001) pp. 39\u201356."},{"key":"3562_CR2","first-page":"2","volume":"E80-A","author":"K. Aoki","year":"1997","journal-title":"IEICE Transactions on Fundamentals"},{"key":"3562_CR3","unstructured":"E. Biham, Cryptanalysis of Ladder-DES. In Eli Biham (ed.), Fast Software Encryption, Haifa, Israel, January 20\u201322, 1997, volume 1267 of Lecture Notes in Computer Science, Springer-Verlag (1997) pp. 134\u2013138."},{"key":"3562_CR4","unstructured":"H. Gilbert and M. Minier, New results on the pseudorandomness of some blockcipher constructions, In Mitsuru Matsui, editor, Fast Software Encryption,Yokohama, Japan, April 2\u20134, 2001, volume 2355 of Lecture Notes in Computer Science, Springer-Verlag (2002) pp. 248\u2013266."},{"key":"3562_CR5","unstructured":"L. R. Knudsen, DEAL \u2013 A 128-bit Block Cipher, Technical Report #151, University of Bergen, Department of Informatics, Norway, February 1998. Submitted as a candidate for the Advanced Encryption Standard."},{"issue":"2","key":"3562_CR6","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1998","journal-title":"SIAM Journal on Computing"},{"key":"3562_CR7","unstructured":"S. Lucks, Faster Luby\u2013Rackoff ciphers, In Dieter Gollmann (ed.), Fast Software Encryption, Cambridge, UK, February 21\u201323, 1996, volume 1039 of Lecture Notes in Computer Science, Springer-Verlag (1996) pp. 189\u2013203."},{"issue":"1","key":"3562_CR8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","journal-title":"Journal of Cryptology"},{"key":"3562_CR9","doi-asserted-by":"crossref","unstructured":"K. Nyberg, Linear approximation of block ciphers. In Alfredo De Santis (ed.), Advances in Cryptology\u2014EUROCRYPT \u201994, Perugia, Italy, May 9\u201312, 1994, volume 950 of Lecture Notes in Computer Science, Springer-Verlag (1995) pp. 439\u2013444.","DOI":"10.1007\/BFb0053460"},{"issue":"1","key":"3562_CR10","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00204800","volume":"8","author":"K. Nyberg","year":"1995","journal-title":"Journal of Cryptology"},{"key":"3562_CR11","unstructured":"J. Patarin, Etude des G\u00e9n\u00e9rateurs de Permutations Bas\u00e9s sur le Sch\u00e9ma du DES. PhD thesis, Universit\u00e9 Paris VI, November 1991."},{"key":"3562_CR12","doi-asserted-by":"crossref","unstructured":"J. Patarin, How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In Rainer A. Rueppel (ed.), Advances in Cryptology\u2014EUROCRYPT \u201992, Balatonf\u00fcred, Hungary, May 24\u201328, 1992, volume 658 of Lecture Notes in Computer Science, Springer-Verlag (1993) pp. 256\u2013266.","DOI":"10.1007\/3-540-47555-9_22"},{"key":"3562_CR13","unstructured":"J. Patarin, About Feistel schemes with six (or more) rounds. In Serge Vaudenay (ed.), Fast Software Encryption, Paris, France, March 23\u201325, 1998, volume 1372 of Lecture Notes in Computer Science, Springer-Verlag (1998) pp. 103\u2013121."},{"key":"3562_CR14","unstructured":"J. Patarin, Generic attacks on Feistel schemes. In Colin Boyd (ed.), Advances in Cryptology \u2013 ASIACRYPTM 2001, Gold Coast, Australia, December 9\u201313, 2001, volume 2248 of Lecture Notes in Computer Science, Springer-Verlag (2001) pp. 222\u2013238."},{"key":"3562_CR15","unstructured":"J. Patarin, Luby-Rackoff: 7 Rounds are enough for 2n(1\u2212\u03b5) security. In Dan Boneh (ed.), Advances in Cryptology \u2013 CRYPTO 2003, Santa Barbara, USA, August 17\u201321, 2003, volume 2729 of Lecture Notes in Computer Science, Springer-Verlag (2003) pp. 513\u2013529."},{"key":"3562_CR16","doi-asserted-by":"crossref","unstructured":"J. Patarin, Security of random feistel schemes with 5 or more rounds. In Matt Franklin (ed.), Advances in Cryptology \u2013 CRYPTO 2004, Santa Barbara, USA, August 15\u201319, 2004, volume 3152 of Lecture Notes in Computer Science, Springer-Verlag (2004) pp. 106\u2013122.","DOI":"10.1007\/978-3-540-28628-8_7"},{"key":"3562_CR17","unstructured":"Z. Ramzan and L. Reyzin, On the round security of symmetric-key cryptographic primitives. In Mihir Bellare (ed.), Advances in Cryptology \u2013 CRYPTO 2000, Santa Barbara, USA, August 20\u201324, 2000, volume 1880 of Lecture Notes in Computer Science, Springer-Verlag (2000) pp. 376\u2013393."},{"issue":"3","key":"3562_CR18","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1023\/A:1008224928678","volume":"12","author":"V. Rijmen","year":"1997","journal-title":"Designs, Codes and Cryptography"},{"key":"3562_CR19","unstructured":"B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall and N. Ferguson Twofish: A 128-bit Block Cipher. NIST AES Proposal. Available from http:\/\/www.counterpane.com\/twofish.html, June 1998."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-3562-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-005-3562-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-005-3562-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:05Z","timestamp":1559245805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-005-3562-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["3562"],"URL":"https:\/\/doi.org\/10.1007\/s10623-005-3562-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5]]}}}