{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T11:04:33Z","timestamp":1760267073725},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T00:00:00Z","timestamp":1291766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s10623-010-9462-0","type":"journal-article","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T06:49:43Z","timestamp":1291704583000},"page":"35-58","source":"Crossref","is-referenced-by-count":15,"title":["On unbalanced Feistel networks with contracting MDS diffusion"],"prefix":"10.1007","volume":"59","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,8]]},"reference":[{"key":"9462_CR1","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel H.: Cryptography and computer privacy. Sci. Am. 228, 15\u201323 (1973)","journal-title":"Sci. Am"},{"key":"9462_CR2","unstructured":"Data Encryption Standard: FIPS. National Bureau of Standards, US Department of Commerce (1977)."},{"key":"9462_CR3","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security, Cryptography, Springer, Heidelberg (2002).","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9462_CR4","unstructured":"Advanced Encryption Standard: FIPS. Publication 197. National Bureau of Standards, US Department of Commerce (2001)."},{"key":"9462_CR5","first-page":"121","volume-title":"FSE\u201996. LNCS, vol. 1039","author":"B. Schneier","year":"1996","unstructured":"Schneier B., Kelsey J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE\u201996. LNCS, vol. 1039, pp. 121\u2013144. Springer, Heidelberg (1996)"},{"key":"9462_CR6","first-page":"186","volume-title":"CRYPTO\u201998. LNCS, vol. 1462","author":"C.S. Jutla","year":"1998","unstructured":"Jutla C.S.: Generalized Birthday Attacks on Unbalanced Feistel Networks. In: Krawczyk, H. (ed.) CRYPTO\u201998. LNCS, vol. 1462, pp. 186\u2013199. Springer, Heidelberg (1998)"},{"key":"9462_CR7","first-page":"189","volume-title":"FSE\u201996. LNCS, vol. 1039","author":"S. Lucks","year":"1996","unstructured":"Lucks S.: Faster Luby-Rackoff Ciphers. In: Gollmann, D. (ed.) FSE\u201996. LNCS, vol. 1039, pp. 189\u2013203. Springer, Heidelberg (1996)"},{"issue":"1","key":"9462_CR8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby-Rackoff Revisited. J. Cryptology 12(1), 29\u201366 (1999)","journal-title":"J. Cryptology"},{"key":"9462_CR9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4, 3\u201372 (1991)","journal-title":"J. Cryptology"},{"key":"9462_CR10","first-page":"386","volume-title":"EUROCRYPT\u201993. LNCS, vol. 765","author":"M. Matsui","year":"1994","unstructured":"Matsui M.: Linear cryptanalysis of the ata Encryption Standard. In: Helleseth, T. (ed.) EUROCRYPT\u201993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"9462_CR11","unstructured":"Lidl R., Niederreiter H.: Finite Fields. Encyclopedia of Mathematics and Its Applications 20. Cambridge University Press, Cambridge (1997)."},{"key":"9462_CR12","first-page":"324","volume-title":"SAC\u201900. LNCS, vol. 2012","author":"M. Kanda","year":"2001","unstructured":"Kanda M.: Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. In: Stinson, D.R., Tavares, S. (eds) SAC\u201900. LNCS, vol. 2012, pp. 324\u2013338. Springer, Heidelberg (2001)"},{"key":"9462_CR13","first-page":"260","volume-title":"FSE\u201904. LNCS, vol. 3017","author":"T. Shirai","year":"2004","unstructured":"Shirai T., Shibutani K.: Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. In: Roy, B., Meier, W. (eds) FSE\u201904. LNCS, vol. 3017, pp. 260\u2013278. Springer, Heidelberg (2004)"},{"key":"9462_CR14","first-page":"1","volume-title":"ASIACRYPT\u201904. LNCS, vol. 3329","author":"T. Shirai","year":"2004","unstructured":"Shirai T., Preneel B.: On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. In: Lee, P.J. (ed.) ASIACRYPT\u201904. LNCS, vol. 3329, pp. 1\u201315. Springer, Heidelberg (2004)"},{"key":"9462_CR15","first-page":"396","volume-title":"ASIACRYPT\u201906. LNCS, vol. 4284","author":"J. Patarin","year":"2006","unstructured":"Patarin J., Nachef V., Berbain C.: Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. In: Lai, X., Chen, K. (eds) ASIACRYPT\u201906. LNCS, vol. 4284, pp. 396\u2013411. Springer, Heidelberg (2006)"},{"key":"9462_CR16","first-page":"325","volume-title":"ASIACRYPT\u201907. LNCS, vol. 4833","author":"J. Patarin","year":"2007","unstructured":"Patarin J., Nachef V., Berbain C.: Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. In: Kurosawa, K. (ed.) ASIACRYPT\u201907. LNCS, vol. 4833, pp. 325\u2013341. Springer, Heidelberg (2007)"},{"key":"9462_CR17","first-page":"461","volume-title":"CRYPTO\u201989. LNCS, vol. 435","author":"Y. Zheng","year":"1990","unstructured":"Zheng Y., Matsumoto T., Imai H.: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. In: Brassard, G. (ed.) CRYPTO\u201989. LNCS, vol. 435, pp. 461\u2013480. Springer, Heidelberg (1990)"},{"key":"9462_CR18","first-page":"91","volume-title":"ASIACRYPT\u201996. LNCS, vol. 1163","author":"K. Nyberg","year":"1996","unstructured":"Nyberg K.: Generalized Feistel Networks. In: Kim, K., Matsumoto, T. (eds) ASIACRYPT\u201996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996)"},{"key":"9462_CR19","first-page":"181","volume-title":"FSE\u201907. LNCS, vol. 4593","author":"T. Shirai","year":"2007","unstructured":"Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T.: The 128-Bit Blockcipher CLEFIA. In: Biryukov, A. (ed.) FSE\u201907. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"9462_CR20","first-page":"450","volume-title":"CHES\u201907. LNCS, vol. 4727","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov A., Knudsen L.R., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y., Vikkelsoe C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds) CHES\u201907. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"9462_CR21","first-page":"272","volume-title":"CHES\u201909. LNCS, vol. 5747","author":"C. De Canniere","year":"2009","unstructured":"De Canniere C., Dunkelman O., Knezevic M.: KATAN and KTANTAN \u2013 A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds) CHES\u201909. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"9462_CR22","first-page":"55","volume-title":"EUROCRYPT\u201993. LNCS, vol. 765","author":"K. Nyberg","year":"1994","unstructured":"Nyberg K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT\u201993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"9462_CR23","unstructured":"Dillon J.: APN polynomials: An update. In: Fq9, the 9th International Conference on Finite Fields and Applications, Dublin, Ireland, Invited talk (2009)."},{"key":"9462_CR24","unstructured":"Hou X.-d.: Affinity of permutations of $${\\mathbb{F}_2^n}$$ . In: Proceedings of the Workshop on Coding and Cryptography WCC 2003 (2003), pp. 273\u2013280. Completed version in Discrete Applied Mathematics 154(2), 313\u2013325 (2006)."},{"key":"9462_CR25","first-page":"99","volume-title":"FSE\u201996. LNCS, vol. 1039","author":"V. Rijmen","year":"1996","unstructured":"Rijmen V., Daemen J., Preneel B., Bossalaers A., Win E.D.: The Cipher SHARK. In: Gollmann, D. (ed.) FSE\u201996. LNCS, vol. 1039, pp. 99\u2013111. Springer, Heidelberg (1996)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9462-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9462-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9462-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:45:01Z","timestamp":1559843101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9462-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,8]]},"references-count":25,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["9462"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9462-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,8]]}}}