{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:59Z","timestamp":1767339299392},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,3,27]],"date-time":"2010-03-27T00:00:00Z","timestamp":1269648000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s10623-010-9386-8","type":"journal-article","created":{"date-parts":[[2010,3,26]],"date-time":"2010-03-26T14:20:23Z","timestamp":1269613223000},"page":"45-72","source":"Crossref","is-referenced-by-count":17,"title":["On Lai\u2013Massey and quasi-Feistel ciphers"],"prefix":"10.1007","volume":"58","author":[{"given":"Aaram","family":"Yun","sequence":"first","affiliation":[]},{"given":"Je Hong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jooyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,27]]},"reference":[{"key":"9386_CR1","first-page":"233","volume-title":"Fast Software Encryption\u2014FSE 2001. Lecture Notes in Computer Science, vol. 2355","author":"T. Iwata","year":"2001","unstructured":"Iwata T., Yoshio T., Yuasa T., Kurosawa K.: Round security and super-pseudorandomness of MISTY type structure. In: Matsui, M. (eds) Fast Software Encryption\u2014FSE 2001. Lecture Notes in Computer Science, vol. 2355., pp. 233\u2013247. Springer, Heidelberg (2001)"},{"key":"9386_CR2","first-page":"114","volume-title":"Selected Areas in Cryptography\u2014SAC 2004. Lecture Notes in Computer Science, vol. 3357","author":"P. Junod","year":"2004","unstructured":"Junod P., Vaudenay S.: FOX: a new family of block ciphers. In: Handschuh, H., Hasan, M.A. (eds) Selected Areas in Cryptography\u2014SAC 2004. Lecture Notes in Computer Science, vol. 3357, pp. 114\u2013129. Springer, Heidelberg (2004)"},{"key":"9386_CR3","volume-title":"On the design and security of block ciphers. ETH Series in Information Processing, vol. 1","author":"X. Lai","year":"1992","unstructured":"Lai X.: On the design and security of block ciphers. ETH Series in Information Processing, vol. 1. Hartung-Gorre, Konstanz (1992)"},{"key":"9386_CR4","first-page":"389","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201990. Lecture Notes in Computer Science, vol, 473","author":"X. Lai","year":"1990","unstructured":"Lai X., Massey J.L.: A proposal for a new block encryption standard. In: Damg\u00e5rd, I. (eds) Advances in Cryptology\u2014EUROCRYPT\u201990. Lecture Notes in Computer Science, vol, 473, pp. 389\u2013404. Springer, Heidelberg (1990)"},{"issue":"2","key":"9386_CR5","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)","journal-title":"SIAM J. Comput."},{"key":"9386_CR6","first-page":"54","volume-title":"Fast Software Encryption\u2014 FSE\u201997. Lecture Notes in Computer Science, vol. 1267","author":"M. Matsui","year":"1997","unstructured":"Matsui M.: New block encryption algorithm MISTY. In: Biham, E. (eds) Fast Software Encryption\u2014 FSE\u201997. Lecture Notes in Computer Science, vol. 1267, pp. 54\u201368. Springer, Heidelberg (1997)"},{"key":"9386_CR7","first-page":"544","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656","author":"U. Maurer","year":"2003","unstructured":"Maurer U., Pietrzak K.: The security of many-round Luby\u2013Rackoff pseudo-random permutations. In: Biham, E. (eds) Advances in Cryptology\u2014EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 544\u2013561. Springer, Heidelberg (2003)"},{"issue":"1","key":"9386_CR8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby\u2013Rackoff revisited. J. Cryptol. 12(1), 29\u201366 (1999)","journal-title":"J. Cryptol."},{"key":"9386_CR9","first-page":"193","volume-title":"EUROCODE\u201990. Lecture Notes in Computer Science, vol. 514","author":"J. Patarin","year":"1991","unstructured":"Patarin J.: Pseudorandom permutations based on the DES scheme. In: Cohen, G.D., Charpin, P. (eds) EUROCODE\u201990. Lecture Notes in Computer Science, vol. 514, pp. 193\u2013204. Springer, Heidelberg (1991)"},{"key":"9386_CR10","unstructured":"Patarin J.: Etude des g\u00e9n\u00e9rateurs de permutations pseudo-al\u00e9atoires bas\u00e9s sur le sch\u00e9ma du D.E.S. Ph.D. thesis, Universit\u00e9 Paris VI (1991)."},{"key":"9386_CR11","first-page":"301","volume-title":"Advances in Cryptology\u2014CRYPTO \u201991. Lecture Notes in Computer Science, vol. 576","author":"J. Patarin","year":"1991","unstructured":"Patarin J.: New results on pseudorandom permutation generators based on the DES scheme. In: Feigenbaum, J. (eds) Advances in Cryptology\u2014CRYPTO \u201991. Lecture Notes in Computer Science, vol. 576, pp. 301\u2013312. Springer, Heidelberg (1991)"},{"key":"9386_CR12","first-page":"256","volume-title":"Advances in Cryptology\u2014EUROCRYPT \u201992. Lecture Notes in Computer Science, vol. 658","author":"J. Patarin","year":"1993","unstructured":"Patarin J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel, R.A. (eds) Advances in Cryptology\u2014EUROCRYPT \u201992. Lecture Notes in Computer Science, vol. 658, pp. 256\u2013266. Springer, Heidelberg (1993)"},{"key":"9386_CR13","first-page":"103","volume-title":"Fast Software Encryption\u2014FSE \u201998. Lecture Notes in Computer Science, vol. 1372","author":"J. Patarin","year":"1998","unstructured":"Patarin J.: About Feistel schemes with six (or more) rounds. In: Vaudenay, S. (eds) Fast Software Encryption\u2014FSE \u201998. Lecture Notes in Computer Science, vol. 1372, pp. 103\u2013121. Springer, Heidelberg (1998)"},{"key":"9386_CR14","first-page":"513","volume-title":"Advances in Cryptology\u2014CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729","author":"J. Patarin","year":"2003","unstructured":"Patarin J.: Luby\u2013Rackoff: 7 rounds are enough for $${2^{n(1-\\epsilon)}}$$ security. In: Boneh D., ((eds) Advances in Cryptology\u2014CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729, pp. 513\u2013529. Springer, Heidelberg (2003)"},{"key":"9386_CR15","first-page":"106","volume-title":"Advances in Cryptology\u2014CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152","author":"J. Patarin","year":"2004","unstructured":"Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin, M.K. (eds) Advances in Cryptology\u2014CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152, pp. 106\u2013122. Springer, Heidelberg (2004)"},{"key":"9386_CR16","first-page":"328","volume-title":"Selected Areas in Cryptography\u2014SAC 2008. Lecture Notes in Computer Science, vol. 5381","author":"J. Patarin","year":"2009","unstructured":"Patarin J.: The \u201ccoefficients H\u201d technique. In: Avanzi, R.M., Keliher, L., Sica, F. (eds) Selected Areas in Cryptography\u2014SAC 2008. Lecture Notes in Computer Science, vol. 5381, pp. 328\u2013345. Springer, Heidelberg (2009)"},{"key":"9386_CR17","first-page":"396","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2006. Lecture Notes in Computer Science, vol. 4284","author":"J. Patarin","year":"2006","unstructured":"Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with contracting functions. In: Lai, X., Chen K., ((eds) Advances in Cryptology\u2014ASIACRYPT 2006. Lecture Notes in Computer Science, vol. 4284, pp. 396\u2013411. Springer, Heidelberg (2006)"},{"issue":"2","key":"9386_CR18","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s10623-005-3562-2","volume":"39","author":"G. Piret","year":"2006","unstructured":"Piret G.: Luby\u2013Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme. Des. Codes Cryptogr. 39(2), 233\u2013245 (2006)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"9386_CR19","first-page":"19","volume":"80-A","author":"K. Sakurai","year":"1997","unstructured":"Sakurai K., Zheng Y.: On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis. IEICE Trans. Fundam. 80-A(1), 19\u201324 (1997)","journal-title":"IEICE Trans. Fundam."},{"key":"9386_CR20","first-page":"121","volume-title":"Fast Software Encryption\u2014FSE \u201996. Lecture Notes in Computer Science, vol. 1039","author":"B. Schneier","year":"1996","unstructured":"Schneier B., Kelsey J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (eds) Fast Software Encryption\u2014FSE \u201996. Lecture Notes in Computer Science, vol. 1039, pp. 121\u2013144. Springer, Heidelberg (1996)"},{"key":"9386_CR21","volume-title":"An Introduction to Quasigroups and their Representations","author":"J.D.H. Smith","year":"2007","unstructured":"Smith J.D.H.: An Introduction to Quasigroups and their Representations. Chapman & Hall\/CRC, Boca Raton (2007)"},{"key":"9386_CR22","unstructured":"Sugita M.: Pseudorandomness of a block cipher MISTY. Technical Report of IEICE, ISEC96-9, pp 13\u201321 (1996)."},{"key":"9386_CR23","first-page":"8","volume-title":"Advances in Cryptology\u2014ASIACRYPT \u201999. Lecture Notes in Computer Science, vol. 1716","author":"S. Vaudenay","year":"1999","unstructured":"Vaudenay S.: On the Lai\u2013Massey scheme. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds) Advances in Cryptology\u2014ASIACRYPT \u201999. Lecture Notes in Computer Science, vol. 1716, pp. 8\u201319. Springer, Heidelberg (1999)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9386-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9386-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9386-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:28Z","timestamp":1559246308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9386-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,27]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["9386"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9386-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,27]]}}}