Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes

Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution–permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IET information security Ročník 9; číslo 5; s. 277 - 283
Hlavní autoři: Dong, Le, Wang, Yanling, Wu, Wenling, Zou, Jian
Médium: Journal Article
Jazyk:angličtina
Vydáno: The Institution of Engineering and Technology 01.09.2015
Témata:
ISSN:1751-8709, 1751-8717
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution–permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another choice to build round functions, namely the double SP-functions, which has two SP-layers in series. They showed that a 4-branch type-2 GFN with double SP-functions was stronger than the one with single SP-function in terms of the number of active S-boxes in a differential or linear cryptanalysis, but some subsequent results showed that the double SP-function is the weaker one in some known-key scenarios and hashing modes. In this study, the authors present a new result of the 4-branch type-2 GFN, whose round function is a single SP-function. They show some 15-round truncated differential distinguishers for this network with four usual parameters by utilising some rebound attack techniques. Based on these distinguishers, they construct some 15-round near-collision attacks on the Matyas–Meyer–Oseas and Miyaguchi–Preneel compression function modes in which the 4-branch type-2 GFN with the single SP-function is used.
AbstractList Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution-permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another choice to build round functions, namely the double SP-functions, which has two SP-layers in series. They showed that a 4-branch type-2 GFN with double SP-functions was stronger than the one with single SP-function in terms of the number of active S-boxes in a differential or linear cryptanalysis, but some subsequent results showed that the double SP-function is the weaker one in some known-key scenarios and hashing modes. In this study, the authors present a new result of the 4-branch type-2 GFN, whose round function is a single SP-function. They show some 15-round truncated differential distinguishers for this network with four usual parameters by utilising some rebound attack techniques. Based on these distinguishers, they construct some 15-round near-collision attacks on the Matyas-Meyer-Oseas and Miyaguchi-Preneel compression function modes in which the 4-branch type-2 GFN with the single SP-function is used.
Author Dong, Le
Zou, Jian
Wu, Wenling
Wang, Yanling
Author_xml – sequence: 1
  givenname: Le
  orcidid: 0000-0003-0448-595X
  surname: Dong
  fullname: Dong, Le
  email: dongle127@163.com
  organization: 1College of Mathematics and Information Science, Henan Normal University, People's Republic of China
– sequence: 2
  givenname: Yanling
  surname: Wang
  fullname: Wang, Yanling
  organization: 1College of Mathematics and Information Science, Henan Normal University, People's Republic of China
– sequence: 3
  givenname: Wenling
  surname: Wu
  fullname: Wu, Wenling
  organization: 2Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, People's Republic of China
– sequence: 4
  givenname: Jian
  surname: Zou
  fullname: Zou, Jian
  organization: 3College of Mathematics and Computer Science, Fuzhou University, People's Republic of China
BookMark eNqFkU2O1DAQhSM0SMwMHICdl7Bw40qcP3Yw6oYWI7GYYW05Tnni6bTd2I5aveMO3IQjcRIcghBC_KxcVr3vVaneRXZmncUsewpsBYy3LwxGanRY5Qz4inGWP8jOoS6BNjXUZz9r1j7KLkK4Z6ysStaeZ1_eWXe0dIcn0psQjb2bTBjQB-IsgZJ6N9mecNp5adVA4umANCd3aNHL0QTsyQYThyOxGI_O7wI5mjiQkJxGJGHqkmmconH266fPB_T7Kcr5R_Rk1VwEItMEi9JT5cbkOTdljFLtvi9hYiCDDEMyJHvXY3icPdRyDPjkx3uZfdisb6_e0uv3b7ZXr66p4gxaqmSHWEJe1T0UkGNb11p2HArkChvdM1Ct6opc9g3oQjfIey0LUJJ3RYWMF5fZs8X34N3HCUMUexMUjqO06KYgoIGKVWXLIElhkSrvQvCoxcGbvfQnAUzM-YiUj0j5iDkfMeeTmPo3RpnlNNFLM_6TfLmQRzPi6f-jxPZmnb_eMAasTfDzBZ5l927yNt1QbNe3Yru5-YU59Dpp6R-0f1_sG0grzpc
CitedBy_id crossref_primary_10_1155_2021_6515844
crossref_primary_10_1007_s10623_016_0242_3
Cites_doi 10.1007/978-3-642-27890-7_5
10.1007/978-3-540-74619-5_12
10.1007/978-3-642-05445-7_2
10.1007/978-3-642-31448-3_7
10.1007/3-540-48329-2_31
10.1007/3-540-45708-9_21
10.1007/978-3-642-21702-9_23
10.1007/978-3-642-24209-0_3
10.1007/978-3-642-13858-4_21
10.1007/978-3-642-10366-7_8
10.1007/978-3-642-31912-9_1
10.1007/978-3-540-76900-2_19
10.1007/978-3-642-05445-7_8
10.1007/978-3-642-34931-7_16
10.1007/978-3-642-22497-3_8
10.1007/978-3-642-10366-7_7
10.1007/0-387-34805-0_42
10.1007/978-3-642-21031-0_16
10.1007/978-3-642-03317-9_16
10.1007/978-3-642-13858-4_16
10.1007/978-3-319-03515-4_9
10.1007/978-3-642-02384-2_5
10.1007/978-3-642-14623-7_20
10.1007/978-3-642-25385-0_14
10.1007/978-3-642-14423-3_20
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2020 The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2020 The Institution of Engineering and Technology
DBID AAYXX
CITATION
7SC
7SP
8FD
F28
FR3
JQ2
L7M
L~C
L~D
DOI 10.1049/iet-ifs.2014.0402
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database
CrossRef


DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1751-8717
EndPage 283
ExternalDocumentID 10_1049_iet_ifs_2014_0402
ISE2BF00109
Genre article
GrantInformation_xml – fundername: National Cryptology Development Foundation during the 12th Five-years Plan Period
  grantid: MMJJ201401004
– fundername: National Natural Science Foundation of China
  grantid: 61402154
– fundername: National Natural Science Foundation of China
  funderid: 61402154
– fundername: National Cryptology Development Foundation during the 12th Five‐years Plan Period
  funderid: MMJJ201401004
GroupedDBID 0R
24P
29I
3V.
4.4
5GY
6IK
8AL
8FE
8FG
AAJGR
ABJCF
ABUWG
ACGFS
ACIWK
AENEX
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BENPR
BFFAM
BGLVJ
BPHCQ
CS3
DU5
DWQXO
EBS
EJD
GNUQQ
HCIFZ
HZ
IFIPE
IPLJI
JAVBF
K6V
K7-
L6V
LAI
LOTEE
LXI
LXU
M0N
M43
M7S
NADUK
NXXTH
O9-
OCL
P2P
P62
PQEST
PQQKQ
PQUKI
PROAC
PTHSS
RIE
RIG
RNS
RUI
S0W
UNMZH
UNR
ZZ
.DC
0R~
0ZK
1OC
AAHHS
AAHJG
ABMDY
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ADEYR
ADZOD
AEEZP
AEGXH
AEQDE
AIAGR
AIWBW
AJBDE
ALUQN
AVUZU
CCPQU
GROUPED_DOAJ
HZ~
IAO
ITC
MCNEO
OK1
ROL
~ZZ
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
7SC
7SP
8FD
F28
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c4019-cabee51267d1312e977fab413e4ce8fd01c9cb32ad81f3f8e4dfa31ca4b36e043
IEDL.DBID 24P
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000359750000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-8709
IngestDate Fri Sep 05 07:59:14 EDT 2025
Tue Nov 18 22:32:31 EST 2025
Wed Oct 29 21:11:48 EDT 2025
Wed Jan 22 16:32:35 EST 2025
Tue Jan 05 21:46:14 EST 2021
Thu May 09 18:04:55 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords single SP-function
hashing modes
cryptography
double SP-functions
near-collision attacks
hash functions
differential cryptanalysis
Miyaguchi–Preneel compression function modes
single substitution permutation functions
substitution permutation transformation
linear cryptanalysis
known-key distinguishers
block ciphers
rebound attack techniques
Matyas–Meyer–Oseas
SP-layers
15-round 4-branch type-2 generalised Feistel networks
SP transformation
linear layer
15-round near-collision attacks
file organisation
S-boxes layer
subkey XOR
4-branch type-2 GFN
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4019-cabee51267d1312e977fab413e4ce8fd01c9cb32ad81f3f8e4dfa31ca4b36e043
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0003-0448-595X
PQID 1816065901
PQPubID 23500
PageCount 7
ParticipantIDs proquest_miscellaneous_1816065901
crossref_primary_10_1049_iet_ifs_2014_0402
wiley_primary_10_1049_iet_ifs_2014_0402_ISE2BF00109
crossref_citationtrail_10_1049_iet_ifs_2014_0402
iet_journals_10_1049_iet_ifs_2014_0402
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 20150900
September 2015
2015-09-00
20150901
PublicationDateYYYYMMDD 2015-09-01
PublicationDate_xml – month: 9
  year: 2015
  text: 20150900
PublicationDecade 2010
PublicationTitle IET information security
PublicationYear 2015
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Deukjo, H.; Dukjae, M.; Daesung, K.; Jaechul, S.; Seokhie, H. (C9) 2012; 95
2009
1998
2007
1994
2013
2002
2012
1990
2011
2010
2012; 95
e_1_2_7_5_2
e_1_2_7_4_2
e_1_2_7_3_2
e_1_2_7_2_2
e_1_2_7_9_2
e_1_2_7_8_2
e_1_2_7_7_2
e_1_2_7_6_2
e_1_2_7_19_2
e_1_2_7_18_2
e_1_2_7_17_2
e_1_2_7_16_2
e_1_2_7_15_2
e_1_2_7_14_2
e_1_2_7_13_2
e_1_2_7_12_2
e_1_2_7_11_2
e_1_2_7_26_2
e_1_2_7_27_2
e_1_2_7_28_2
Deukjo H. (e_1_2_7_10_2) 2012; 95
e_1_2_7_25_2
e_1_2_7_24_2
e_1_2_7_23_2
e_1_2_7_22_2
e_1_2_7_21_2
e_1_2_7_20_2
References_xml – volume: 95
  start-page: 1550
  issue: 9
  year: 2012
  end-page: 1560
  ident: C9
  article-title: Known-key attacks on generalized Feistel schemes with SP round function
  publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci.
– start-page: 126
  year: 2009
  end-page: 140
  article-title: Cryptanalysis of the LANE hash function
– start-page: 252
  year: 2011
  end-page: 269
  article-title: Rebound attack on JH42
– start-page: 320
  year: 2002
  end-page: 335
  article-title: Black‐box analysis of the block‐cipher‐based hash‐function constructions from PGV
– start-page: 286
  year: 2010
  end-page: 303
  article-title: Rebound attack on reduced‐round versions of JH
– start-page: 16
  year: 2009
  end-page: 35
  article-title: Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
– start-page: 365
  year: 2010
  end-page: 383
  article-title: Super‐Sbox cryptanalysis: improved attacks for AES‐like permutations
– start-page: 397
  year: 2011
  end-page: 415
  article-title: Known‐key distinguishers on 11‐round Feistel and collision attacks on its hashing modes
– start-page: 368
  year: 1994
  end-page: 378
  article-title: Hash functions based on block ciphers: a synthetic approach
– start-page: 29
  year: 2011
  end-page: 48
  article-title: Known and chosen key differential distinguishers for block ciphers
– start-page: 106
  year: 2009
  end-page: 125
  article-title: Rebound attack on the full LANE compression function
– start-page: 315
  year: 2007
  end-page: 324
  article-title: Known‐key distinguishers for some block ciphers
– start-page: 87
  year: 2012
  end-page: 100
  article-title: Improved known‐key distinguishers on Feistel‐SP ciphers and application to Camellia
– start-page: 461
  year: 1990
  end-page: 480
  article-title: On the construction of block ciphers provably secure and not relying on any unproved hypotheses
– start-page: 370
  year: 2010
  end-page: 392
  article-title: Improved differential attacks for ECHO and Grøstl
– start-page: 136
  year: 2013
  end-page: 148
  article-title: Security analysis of GFN: 8‐round distinguisher for 4‐branch type‐2 GFN
– start-page: 181
  year: 2007
  end-page: 195
  article-title: The 128‐bit blockcipher CLEFIA
– start-page: 300
  year: 2010
  end-page: 314
  article-title: Practical rebound attack on 12‐round Cheetah‐256
– year: 1998
  article-title: The RC6TM block cipher
– start-page: 208
  year: 2011
  end-page: 221
  article-title: New impossible differential and known‐key distinguishers for the 3D cipher
– start-page: 55
  year: 2012
  end-page: 69
  article-title: Known‐key distinguisher on round‐reduced 3d block cipher
– start-page: 1
  year: 2012
  end-page: 17
  article-title: Improved integral analysis on tweaked lesamnta
– start-page: 60
  year: 2009
  end-page: 76
  article-title: Distinguishers for ciphers and known key attack against Rijndael with large blocks
– start-page: 260
  year: 2009
  end-page: 276
  article-title: The rebound attack: Ccryptanalysis of reduced Whirlpool and Grøstl
– start-page: 126
  year: 2009
  end-page: 143
  article-title: Rebound distinguishers: results on the full Whirlpool compression function
– start-page: 265
  year: 2012
  end-page: 282
  article-title: Double‐SP is weaker than single‐SP: rebound attacks on Feistel ciphers with several rounds
– start-page: 106
  year: 2011
  end-page: 119
  article-title: Double SP‐functions: enhanced generalized Feistel networks
– volume: 95
  start-page: 1550
  issue: 9
  year: 2012
  end-page: 1560
  article-title: Known‐key attacks on generalized Feistel schemes with SP round function
  publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci.
– volume: 95
  start-page: 1550
  issue: 9
  year: 2012
  ident: e_1_2_7_10_2
  article-title: Known‐key attacks on generalized Feistel schemes with SP round function
  publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci.
– ident: e_1_2_7_7_2
  doi: 10.1007/978-3-642-27890-7_5
– ident: e_1_2_7_15_2
  doi: 10.1007/978-3-540-74619-5_12
– ident: e_1_2_7_20_2
  doi: 10.1007/978-3-642-05445-7_2
– ident: e_1_2_7_6_2
  doi: 10.1007/978-3-642-31448-3_7
– ident: e_1_2_7_17_2
  doi: 10.1007/3-540-48329-2_31
– ident: e_1_2_7_18_2
  doi: 10.1007/3-540-45708-9_21
– ident: e_1_2_7_5_2
  doi: 10.1007/978-3-642-21702-9_23
– ident: e_1_2_7_16_2
  doi: 10.1007/978-3-642-24209-0_3
– ident: e_1_2_7_22_2
  doi: 10.1007/978-3-642-13858-4_21
– ident: e_1_2_7_21_2
  doi: 10.1007/978-3-642-10366-7_8
– ident: e_1_2_7_9_2
  doi: 10.1007/978-3-642-31912-9_1
– ident: e_1_2_7_2_2
  doi: 10.1007/978-3-540-76900-2_19
– ident: e_1_2_7_25_2
  doi: 10.1007/978-3-642-05445-7_8
– ident: e_1_2_7_4_2
  doi: 10.1007/978-3-642-34931-7_16
– ident: e_1_2_7_12_2
  doi: 10.1007/978-3-642-22497-3_8
– ident: e_1_2_7_24_2
  doi: 10.1007/978-3-642-10366-7_7
– ident: e_1_2_7_11_2
  doi: 10.1007/0-387-34805-0_42
– ident: e_1_2_7_8_2
  doi: 10.1007/978-3-642-21031-0_16
– ident: e_1_2_7_19_2
  doi: 10.1007/978-3-642-03317-9_16
– ident: e_1_2_7_14_2
– ident: e_1_2_7_26_2
  doi: 10.1007/978-3-642-13858-4_16
– ident: e_1_2_7_13_2
  doi: 10.1007/978-3-319-03515-4_9
– ident: e_1_2_7_3_2
  doi: 10.1007/978-3-642-02384-2_5
– ident: e_1_2_7_23_2
  doi: 10.1007/978-3-642-14623-7_20
– ident: e_1_2_7_27_2
  doi: 10.1007/978-3-642-25385-0_14
– ident: e_1_2_7_28_2
  doi: 10.1007/978-3-642-14423-3_20
SSID ssj0056509
Score 2.0123565
Snippet Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a...
SourceID proquest
crossref
wiley
iet
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 277
SubjectTerms 15‐round 4‐branch type‐2 generalised Feistel networks
15‐round near‐collision attacks
4‐branch type‐2 GFN
block ciphers
Blocking
Compressing
Computer information security
Construction
Cryptography
differential cryptanalysis
double SP‐functions
Encryption
file organisation
hash functions
hashing modes
known‐key distinguishers
linear cryptanalysis
linear layer
Matyas–Meyer–Oseas
Miyaguchi–Preneel compression function modes
near‐collision attacks
Networks
rebound attack techniques
single SP‐function
single substitution permutation functions
SP transformation
SP‐layers
subkey XOR
substitution permutation transformation
S‐boxes layer
Transformations (mathematics)
Title Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes
URI http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2014.0402
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ifs.2014.0402
https://www.proquest.com/docview/1816065901
Volume 9
WOSCitedRecordID wos000359750000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8717
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0056509
  issn: 1751-8709
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bi9QwFA7r6oMvrld2vBFFfBCqTZPeHnWZ4oAMC7vivoUkTXYLQ2eYdnzenyD4d_w1-0s8J2lHB2EF8aW0aZoGzjU5J-cj5JUoBeeidJGwLocFSp5HOstNVODamaXKaetL5n_K5_Pi7Kw83iNH41mYUB9iu-GGkuH1NQq40gGFBJxaIGJj-6hxWHGbibfAiqCHbzLGc2TtRByP6jjFEnH-VGTKQPTjchvaLN_9McSOcboBr3f8zt-9V29-qoP_MvG75M7gfdL3gV3ukT3b3icHI7IDHQT9AfmBaNjt1eU3EHFaoxpozzche54uW8pSeLVGQCYq4E4jOMcFxd1ceEroeShl3XS2ppVFPlrQNqSbdxQ3filuUCws7UBr-VQFYI6ry-8rsBKbkBpA0d56kaAK_tKCPMLQyLT-LDxVfY_FAXAyTd_RiwAJRRHXp3tIPlfT06OP0YDzEBlY3ZWRUdpacDyyvGacJRZcUqc0WFcrjC1cHTNTGs0TVRfMcVdYUTvFmVFC88zGgj8i--2ytYeEal7oJE-cwjL-Clw_njGNWH0sdWWd6AmJRwJLMxRBRyyOhfTBeFFKoI4E6kikjkTqTMib7SerUAHkus6vsW3QA911HV_udJxNT-WsOvnVQa5qNyEvRu6TIPUYylGtXW5g3IJlGBGP2YRwz2x_n5ucnUyTD5UPhj7-p6-ekNvQnoYUu6dkv19v7DNyy3ztm2793IsdXL_M5j8BzdE6bw
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bixMxFA7rKuiL6xXrNYr4IIxOJpnbo5cOW6xlYSvsW0hmkt2BMi2dqc_7EwT_jr9mf4nnJDPVIqwgvrWdM2ngXHPOyXcIeSlywbnIbSCMTeGAkqaBTtIyyPDszGJltXGQ-dN0NstOTvKjPfJxuAvj8SG2CTfUDGevUcExIe0PnAJBMmvTBbVFyG0m3oAsgiG-KsDb4ByDSBwN9jhGjDh3LTJmoPthvq1t5m__WGLHO12BxzuB5-_hq_M_xcH_2fktcrOPP-k7LzC3yZ5p7pCDYbYD7VX9LvmB87Cbi_NvoOS0QkPQnG58_zxdNpTF8GiNI5mogE8ax3OcUcznwreInnow67o1FS0MStKCNr7hvKWY-qWYolgY2oLdcs0KIB4X599X4Cc2vjmAosd1SkEV_EsDGglLo9i62_BUdR3CA-Bm6q6lZ34oFMXJPu098qUYzz8cBv2kh6CE810elEobA6FHklaMs8hAUGqVBv9qRGkyW4WszEvNI1VlzHKbGVFZxVmphOaJCQW_T_abZWMeEKp5pqM0sgqB_BUEfzxhGqf1sdjmVaRHJBw4LMseBh2ncSykK8eLXAJ3JHBHInckcmdEXm9fWXkMkMuIX-FvvSVoLyN8sUM4Gc_lpDj-RSBXlR2R54P4SdB7LOaoxiw3sG7GEqyJh2xEuJO2v-9NTo7H0fvClUMf_tNbz8j1w_nnqZxOZp8ekRtAE_uGu8dkv1tvzBNyrfza1e36qdPBn9rDPUI
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bi9QwFA7rKuKL6xVnvUURH4SuTZPeHtWd4uAyDOwK-xaSNtktDJ1h2tnn_QmCf8dfs7_Ec5J2dBBWEN96OU0D55qck-8Q8kbkgnOR20AYm8ICJU0DnaRlkOHamcXKauMg84_S6TQ7Pc1nO-RwOAvj8SE2G26oGc5eo4KbZWX9glMgSGZtuqC2CLnNxAHIIhjimyIGW4v4zmI22OMYMeLcsciYge6H-Sa3mb__Y4gt73QDXm8Fnr-Hr87_FHv_Z-b3yN0-_qQfvMDcJzumeUD2ht4OtFf1h-QH9sNuri6_gZLTCg1Bc7b29fN00VAWw6sVtmSiAq40tuc4p7ifC3cRPfNg1nVrKloYlKQ5bXzBeUtx65fiFsXc0BbslitWAPG4uvy-BD-x9sUBFD2uUwqq4C8NaCQMjWLrTsNT1XUID4CTqbuWnvumUBQ7-7SPyNdifPLpc9B3eghKWN_lQam0MRB6JGnFOIsMBKVWafCvRpQms1XIyrzUPFJVxiy3mRGVVZyVSmiemFDwx2S3WTTmCaGaZzpKI6sQyF9B8McTprFbH4ttXkV6RMKBw7LsYdCxG8dcunS8yCVwRwJ3JHJHIndG5N3mk6XHALmO-C0-6y1Bex3h6y3CyfhETorjXwQShGZEXg3iJ0HvMZmjGrNYw7gZSzAnHrIR4U7a_j43OTkeRx8Llw7d_6evXpLbs8NCHk2mX56SO0AS-3q7Z2S3W63Nc3KrvOjqdvXCqeBPL6U8xg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Known%E2%80%90key+distinguishers+on+15%E2%80%90round+4%E2%80%90branch+type%E2%80%902+generalised+Feistel+networks+with+single+substitution%E2%80%93permutation+functions+and+near%E2%80%90collision+attacks+on+its+hashing+modes&rft.jtitle=IET+information+security&rft.au=Dong%2C+Le&rft.au=Wang%2C+Yanling&rft.au=Wu%2C+Wenling&rft.au=Zou%2C+Jian&rft.date=2015-09-01&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8709&rft.eissn=1751-8717&rft.volume=9&rft.issue=5&rft.spage=277&rft.epage=283&rft_id=info:doi/10.1049%2Fiet-ifs.2014.0402&rft.externalDBID=10.1049%252Fiet-ifs.2014.0402&rft.externalDocID=ISE2BF00109
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8709&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8709&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8709&client=summon