{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:48Z","timestamp":1740122568952,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,6,8]],"date-time":"2016-06-08T00:00:00Z","timestamp":1465344000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402280"],"award-info":[{"award-number":["61402280"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s10623-016-0235-2","type":"journal-article","created":{"date-parts":[[2016,6,7]],"date-time":"2016-06-07T23:51:22Z","timestamp":1465343482000},"page":"407-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Generic attacks on the Lai\u2013Massey scheme"],"prefix":"10.1007","volume":"83","author":[{"given":"Yiyuan","family":"Luo","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yujie","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,8]]},"reference":[{"key":"235_CR1","doi-asserted-by":"crossref","unstructured":"Bogdanov A., Knudsen L., Leander G., Standaert F., Steinberger J., Tischhauser E.: Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. In: ASIACRYPT 2012. LNCS, vol.\u00a07237, pp.\u00a045\u201362. Springer, Berlin (2012).","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"235_CR2","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: The Design of Rijndael: AES\u2014The Advanced Encryption Standard. Springer, Berlin (2002).","DOI":"10.1007\/978-3-662-04722-4"},{"key":"235_CR3","doi-asserted-by":"crossref","unstructured":"Even S., Mansour Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151\u2013162 (1997).","DOI":"10.1007\/s001459900025"},{"key":"235_CR4","doi-asserted-by":"crossref","unstructured":"Feistel H.: Cryptography and computer privacy. Sci. Am. 228(5), 15\u201323 (1973).","DOI":"10.1038\/scientificamerican0573-15"},{"key":"235_CR5","doi-asserted-by":"crossref","unstructured":"Gilbert H., Minier M.: New results on the pseudorandomness of some blockcipher constructions. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp.\u00a0248\u2013266. Springer, Berlin (2002).","DOI":"10.1007\/3-540-45473-X_21"},{"key":"235_CR6","doi-asserted-by":"crossref","unstructured":"Guo R., Jin C.: Impossible differential cryptanalysis on Lai-Massey scheme. ETRI J. 36(6), 1032\u20131040 (2014).","DOI":"10.4218\/etrij.14.0113.1335"},{"key":"235_CR7","doi-asserted-by":"crossref","unstructured":"Junod P., Vaudenay S.: FOX: a new family of block ciphers. In: Selected Areas in Cryptography\u2014SAC\u20192004. LNCS, vol.\u00a03357, pp.\u00a0114\u2013129. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-30564-4_8"},{"key":"235_CR8","unstructured":"Knudsen L.R.: DEAL-A 128-bit block cipher. Technical Report 151. Department of Informatics, University of Bergen (1998)."},{"key":"235_CR9","unstructured":"Lai X., Massey J.L.: A proposal for a new block encryption standard. In: Ivan D. (ed.) Advances in Cryptology\u2014EUROCRYPT\u201990 (Aarhus, Denmark). LNCS, vol.\u00a0473, pp.\u00a0389\u2013404. Springer, Berlin (1990)."},{"key":"235_CR10","doi-asserted-by":"crossref","unstructured":"Lai X., Massey J.L.: Markov ciphers and differential cryptanalysis. In: Davies D.W. (ed.) Advances in Cryptology\u2014EUROCRYPT\u201991 (Brighton, UK). LNCS, vol.\u00a0547, pp.\u00a017\u201338. Springer, Berlin (1991).","DOI":"10.1007\/3-540-46416-6_2"},{"key":"235_CR11","unstructured":"Lai X., Massey J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptography\u2014Eurocrypt\u201992. LNCS, vol.\u00a0658, pp.\u00a055\u201370. Springer, Berlin (1992)."},{"key":"235_CR12","doi-asserted-by":"crossref","unstructured":"Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988).","DOI":"10.1137\/0217022"},{"key":"235_CR13","doi-asserted-by":"crossref","unstructured":"Luo Y., Lai X., Gong Z.: Pseudorandomness analysis of the (extended) Lai-Massey scheme. Inf. Process. Lett. 111(2), 90\u201396 (2010).","DOI":"10.1016\/j.ipl.2010.10.012"},{"key":"235_CR14","unstructured":"Luo Y., Lai X., Hu J.: The pseudorandomness of many-round Lai-Massey scheme. J. Inf. Sci. Eng. 31(1), 1085\u20131096 (2015)."},{"key":"235_CR15","doi-asserted-by":"crossref","unstructured":"Maurer U.M.: A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators. In: Advances in Cryptology\u2014EUROCRYPT\u201992. LNCS, vol.\u00a0658, pp.\u00a0239\u2013255. Springer, Berlin (1992).","DOI":"10.1007\/3-540-47555-9_21"},{"key":"235_CR16","doi-asserted-by":"crossref","unstructured":"Moriai S., Vaudenay S.: On the pseudorandomness of top-level schemes of block ciphers. In: Advances in Cryptology\u2014ASIACRYPT\u201900. LNCS, vol.\u00a01976, pp.\u00a0289\u2013302. Springer, Berlin (2000).","DOI":"10.1007\/3-540-44448-3_22"},{"key":"235_CR17","doi-asserted-by":"crossref","unstructured":"Nachef V., Patarin J., Treger J.: Generic attacks on Misty schemes. In: LATINCRYPT 2010. LNCS, vol.\u00a06212, pp.\u00a0222\u2013240. Springer, Berlin (2010).","DOI":"10.1007\/978-3-642-14712-8_14"},{"key":"235_CR18","doi-asserted-by":"crossref","unstructured":"Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. 12(1), 22\u201366 (1999).","DOI":"10.1007\/PL00003817"},{"key":"235_CR19","unstructured":"Patarin J.: Generic attacks on Feistel schemes (Extended Version). http:\/\/eprint.iacr.org\/2008\/036.pdf ."},{"key":"235_CR20","doi-asserted-by":"crossref","unstructured":"Patarin J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel R.A. (ed.) Advances in Cryptology\u2014EUROCRYPT\u201992 (Balatonfiired, Hungary). LNCS, vol.\u00a0658, pp.\u00a0256\u2013266. Springer, Berlin (1993).","DOI":"10.1007\/3-540-47555-9_22"},{"key":"235_CR21","doi-asserted-by":"crossref","unstructured":"Patarin J.: About Feistel schemes with six (or more) rounds. In: Vaudenay S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp.\u00a0103\u2013121. Springer, Berlin (1998).","DOI":"10.1007\/3-540-69710-1_8"},{"key":"235_CR22","doi-asserted-by":"crossref","unstructured":"Patarin J.: Generic attacks on Feistel schemes. In: Boyd C. (ed.) ASIACRYPT 2001. LNCS vol.\u00a02248, pp.\u00a0222\u2013238. Springer, Berlin (2001).","DOI":"10.1007\/3-540-45682-1_14"},{"key":"235_CR23","doi-asserted-by":"crossref","unstructured":"Patarin J.: Luby-Rackoff: 7 rounds are enough for $$2^{n(1-\\epsilon )}$$ 2 n ( 1 - \u03f5 ) security. In: Boneh D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp.\u00a0513\u2013529. Springer, Berlin (2003).","DOI":"10.1007\/978-3-540-45146-4_30"},{"key":"235_CR24","doi-asserted-by":"crossref","unstructured":"Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin M.(ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp.\u00a0106\u2013122. Springer, Berlin (2006).","DOI":"10.1007\/978-3-540-28628-8_7"},{"key":"235_CR25","doi-asserted-by":"crossref","unstructured":"Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with contracting functions. In: ASIACRYPT 2006. LNCS, vol.\u00a04284, pp.\u00a0396\u2013411. Springer, Berlin (2006).","DOI":"10.1007\/11935230_26"},{"key":"235_CR26","doi-asserted-by":"crossref","unstructured":"Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with expanding functions. In: ASIACRYPT 2007. LNCS, vol.\u00a04833, pp.\u00a0325\u2013341. Springer, Berlin (2007).","DOI":"10.1007\/978-3-540-76900-2_20"},{"key":"235_CR27","unstructured":"Sadeghiyan B., Pieprzyk J.: On necessary and sufficient conditions for the construction of super pseudorandom permutations. In: Abstracts of ASIACRYPT\u201991. LNCS, vol.\u00a0739, pp.\u00a0194\u2013209. Springer, Berlin (1991)."},{"key":"235_CR28","doi-asserted-by":"crossref","unstructured":"Treger J., Patarin J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp.\u00a041\u201359. Springer, Berlin (2009).","DOI":"10.1007\/978-3-642-02384-2_4"},{"key":"235_CR29","doi-asserted-by":"crossref","unstructured":"Vaudenay S.: Provable security for block ciphers by decorrelation. In: Theoretical Aspects of Computer Science\u2014STACS\u201998. LNCS, vol.\u00a01373, pp.\u00a0249\u2013275. Springer, Berlin (1998).","DOI":"10.1007\/BFb0028566"},{"key":"235_CR30","doi-asserted-by":"crossref","unstructured":"Vaudenay S.: On the Lai-Massey scheme. In: Advances in Cryptology\u2014ASIACRYPT\u201999. LNCS, vol.\u00a01716, pp.\u00a08\u201319. Springer, Berlin (1999).","DOI":"10.1007\/978-3-540-48000-6_2"},{"key":"235_CR31","doi-asserted-by":"crossref","unstructured":"Yun A., Park J., Lee J.: On Lai-Massey and quasi-Feistel ciphers. Des. Codes Cryptogr. 58, 45\u201372 (2011).","DOI":"10.1007\/s10623-010-9386-8"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0235-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0235-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0235-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0235-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T11:56:14Z","timestamp":1498305374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0235-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,8]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["235"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0235-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2016,6,8]]}}}