Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes
Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution–permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another...
Uloženo v:
| Vydáno v: | IET information security Ročník 9; číslo 5; s. 277 - 283 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
The Institution of Engineering and Technology
01.09.2015
|
| Témata: | |
| ISSN: | 1751-8709, 1751-8717 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution–permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another choice to build round functions, namely the double SP-functions, which has two SP-layers in series. They showed that a 4-branch type-2 GFN with double SP-functions was stronger than the one with single SP-function in terms of the number of active S-boxes in a differential or linear cryptanalysis, but some subsequent results showed that the double SP-function is the weaker one in some known-key scenarios and hashing modes. In this study, the authors present a new result of the 4-branch type-2 GFN, whose round function is a single SP-function. They show some 15-round truncated differential distinguishers for this network with four usual parameters by utilising some rebound attack techniques. Based on these distinguishers, they construct some 15-round near-collision attacks on the Matyas–Meyer–Oseas and Miyaguchi–Preneel compression function modes in which the 4-branch type-2 GFN with the single SP-function is used. |
|---|---|
| AbstractList | Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a substitution-permutation (SP) transformation (consists of a subkey XOR, an S-boxes layer and a linear layer). In 2011, Bogdanov and Shibutani provided another choice to build round functions, namely the double SP-functions, which has two SP-layers in series. They showed that a 4-branch type-2 GFN with double SP-functions was stronger than the one with single SP-function in terms of the number of active S-boxes in a differential or linear cryptanalysis, but some subsequent results showed that the double SP-function is the weaker one in some known-key scenarios and hashing modes. In this study, the authors present a new result of the 4-branch type-2 GFN, whose round function is a single SP-function. They show some 15-round truncated differential distinguishers for this network with four usual parameters by utilising some rebound attack techniques. Based on these distinguishers, they construct some 15-round near-collision attacks on the Matyas-Meyer-Oseas and Miyaguchi-Preneel compression function modes in which the 4-branch type-2 GFN with the single SP-function is used. |
| Author | Dong, Le Zou, Jian Wu, Wenling Wang, Yanling |
| Author_xml | – sequence: 1 givenname: Le orcidid: 0000-0003-0448-595X surname: Dong fullname: Dong, Le email: dongle127@163.com organization: 1College of Mathematics and Information Science, Henan Normal University, People's Republic of China – sequence: 2 givenname: Yanling surname: Wang fullname: Wang, Yanling organization: 1College of Mathematics and Information Science, Henan Normal University, People's Republic of China – sequence: 3 givenname: Wenling surname: Wu fullname: Wu, Wenling organization: 2Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, People's Republic of China – sequence: 4 givenname: Jian surname: Zou fullname: Zou, Jian organization: 3College of Mathematics and Computer Science, Fuzhou University, People's Republic of China |
| BookMark | eNqFkU2O1DAQhSM0SMwMHICdl7Bw40qcP3Yw6oYWI7GYYW05Tnni6bTd2I5aveMO3IQjcRIcghBC_KxcVr3vVaneRXZmncUsewpsBYy3LwxGanRY5Qz4inGWP8jOoS6BNjXUZz9r1j7KLkK4Z6ysStaeZ1_eWXe0dIcn0psQjb2bTBjQB-IsgZJ6N9mecNp5adVA4umANCd3aNHL0QTsyQYThyOxGI_O7wI5mjiQkJxGJGHqkmmconH266fPB_T7Kcr5R_Rk1VwEItMEi9JT5cbkOTdljFLtvi9hYiCDDEMyJHvXY3icPdRyDPjkx3uZfdisb6_e0uv3b7ZXr66p4gxaqmSHWEJe1T0UkGNb11p2HArkChvdM1Ct6opc9g3oQjfIey0LUJJ3RYWMF5fZs8X34N3HCUMUexMUjqO06KYgoIGKVWXLIElhkSrvQvCoxcGbvfQnAUzM-YiUj0j5iDkfMeeTmPo3RpnlNNFLM_6TfLmQRzPi6f-jxPZmnb_eMAasTfDzBZ5l927yNt1QbNe3Yru5-YU59Dpp6R-0f1_sG0grzpc |
| CitedBy_id | crossref_primary_10_1155_2021_6515844 crossref_primary_10_1007_s10623_016_0242_3 |
| Cites_doi | 10.1007/978-3-642-27890-7_5 10.1007/978-3-540-74619-5_12 10.1007/978-3-642-05445-7_2 10.1007/978-3-642-31448-3_7 10.1007/3-540-48329-2_31 10.1007/3-540-45708-9_21 10.1007/978-3-642-21702-9_23 10.1007/978-3-642-24209-0_3 10.1007/978-3-642-13858-4_21 10.1007/978-3-642-10366-7_8 10.1007/978-3-642-31912-9_1 10.1007/978-3-540-76900-2_19 10.1007/978-3-642-05445-7_8 10.1007/978-3-642-34931-7_16 10.1007/978-3-642-22497-3_8 10.1007/978-3-642-10366-7_7 10.1007/0-387-34805-0_42 10.1007/978-3-642-21031-0_16 10.1007/978-3-642-03317-9_16 10.1007/978-3-642-13858-4_16 10.1007/978-3-319-03515-4_9 10.1007/978-3-642-02384-2_5 10.1007/978-3-642-14623-7_20 10.1007/978-3-642-25385-0_14 10.1007/978-3-642-14423-3_20 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2020 The Institution of Engineering and Technology |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2020 The Institution of Engineering and Technology |
| DBID | AAYXX CITATION 7SC 7SP 8FD F28 FR3 JQ2 L7M L~C L~D |
| DOI | 10.1049/iet-ifs.2014.0402 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1751-8717 |
| EndPage | 283 |
| ExternalDocumentID | 10_1049_iet_ifs_2014_0402 ISE2BF00109 |
| Genre | article |
| GrantInformation_xml | – fundername: National Cryptology Development Foundation during the 12th Five-years Plan Period grantid: MMJJ201401004 – fundername: National Natural Science Foundation of China grantid: 61402154 – fundername: National Natural Science Foundation of China funderid: 61402154 – fundername: National Cryptology Development Foundation during the 12th Five‐years Plan Period funderid: MMJJ201401004 |
| GroupedDBID | 0R 24P 29I 3V. 4.4 5GY 6IK 8AL 8FE 8FG AAJGR ABJCF ABUWG ACGFS ACIWK AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BFFAM BGLVJ BPHCQ CS3 DU5 DWQXO EBS EJD GNUQQ HCIFZ HZ IFIPE IPLJI JAVBF K6V K7- L6V LAI LOTEE LXI LXU M0N M43 M7S NADUK NXXTH O9- OCL P2P P62 PQEST PQQKQ PQUKI PROAC PTHSS RIE RIG RNS RUI S0W UNMZH UNR ZZ .DC 0R~ 0ZK 1OC AAHHS AAHJG ABMDY ABQXS ACCFJ ACCMX ACESK ACGFO ADEYR ADZOD AEEZP AEGXH AEQDE AIAGR AIWBW AJBDE ALUQN AVUZU CCPQU GROUPED_DOAJ HZ~ IAO ITC MCNEO OK1 ROL ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN 7SC 7SP 8FD F28 FR3 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c4019-cabee51267d1312e977fab413e4ce8fd01c9cb32ad81f3f8e4dfa31ca4b36e043 |
| IEDL.DBID | 24P |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000359750000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-8709 |
| IngestDate | Fri Sep 05 07:59:14 EDT 2025 Tue Nov 18 22:32:31 EST 2025 Wed Oct 29 21:11:48 EDT 2025 Wed Jan 22 16:32:35 EST 2025 Tue Jan 05 21:46:14 EST 2021 Thu May 09 18:04:55 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | single SP-function hashing modes cryptography double SP-functions near-collision attacks hash functions differential cryptanalysis Miyaguchi–Preneel compression function modes single substitution permutation functions substitution permutation transformation linear cryptanalysis known-key distinguishers block ciphers rebound attack techniques Matyas–Meyer–Oseas SP-layers 15-round 4-branch type-2 generalised Feistel networks SP transformation linear layer 15-round near-collision attacks file organisation S-boxes layer subkey XOR 4-branch type-2 GFN |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4019-cabee51267d1312e977fab413e4ce8fd01c9cb32ad81f3f8e4dfa31ca4b36e043 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0003-0448-595X |
| PQID | 1816065901 |
| PQPubID | 23500 |
| PageCount | 7 |
| ParticipantIDs | proquest_miscellaneous_1816065901 crossref_primary_10_1049_iet_ifs_2014_0402 wiley_primary_10_1049_iet_ifs_2014_0402_ISE2BF00109 crossref_citationtrail_10_1049_iet_ifs_2014_0402 iet_journals_10_1049_iet_ifs_2014_0402 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | 20150900 September 2015 2015-09-00 20150901 |
| PublicationDateYYYYMMDD | 2015-09-01 |
| PublicationDate_xml | – month: 9 year: 2015 text: 20150900 |
| PublicationDecade | 2010 |
| PublicationTitle | IET information security |
| PublicationYear | 2015 |
| Publisher | The Institution of Engineering and Technology |
| Publisher_xml | – name: The Institution of Engineering and Technology |
| References | Deukjo, H.; Dukjae, M.; Daesung, K.; Jaechul, S.; Seokhie, H. (C9) 2012; 95 2009 1998 2007 1994 2013 2002 2012 1990 2011 2010 2012; 95 e_1_2_7_5_2 e_1_2_7_4_2 e_1_2_7_3_2 e_1_2_7_2_2 e_1_2_7_9_2 e_1_2_7_8_2 e_1_2_7_7_2 e_1_2_7_6_2 e_1_2_7_19_2 e_1_2_7_18_2 e_1_2_7_17_2 e_1_2_7_16_2 e_1_2_7_15_2 e_1_2_7_14_2 e_1_2_7_13_2 e_1_2_7_12_2 e_1_2_7_11_2 e_1_2_7_26_2 e_1_2_7_27_2 e_1_2_7_28_2 Deukjo H. (e_1_2_7_10_2) 2012; 95 e_1_2_7_25_2 e_1_2_7_24_2 e_1_2_7_23_2 e_1_2_7_22_2 e_1_2_7_21_2 e_1_2_7_20_2 |
| References_xml | – volume: 95 start-page: 1550 issue: 9 year: 2012 end-page: 1560 ident: C9 article-title: Known-key attacks on generalized Feistel schemes with SP round function publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci. – start-page: 126 year: 2009 end-page: 140 article-title: Cryptanalysis of the LANE hash function – start-page: 252 year: 2011 end-page: 269 article-title: Rebound attack on JH42 – start-page: 320 year: 2002 end-page: 335 article-title: Black‐box analysis of the block‐cipher‐based hash‐function constructions from PGV – start-page: 286 year: 2010 end-page: 303 article-title: Rebound attack on reduced‐round versions of JH – start-page: 16 year: 2009 end-page: 35 article-title: Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher – start-page: 365 year: 2010 end-page: 383 article-title: Super‐Sbox cryptanalysis: improved attacks for AES‐like permutations – start-page: 397 year: 2011 end-page: 415 article-title: Known‐key distinguishers on 11‐round Feistel and collision attacks on its hashing modes – start-page: 368 year: 1994 end-page: 378 article-title: Hash functions based on block ciphers: a synthetic approach – start-page: 29 year: 2011 end-page: 48 article-title: Known and chosen key differential distinguishers for block ciphers – start-page: 106 year: 2009 end-page: 125 article-title: Rebound attack on the full LANE compression function – start-page: 315 year: 2007 end-page: 324 article-title: Known‐key distinguishers for some block ciphers – start-page: 87 year: 2012 end-page: 100 article-title: Improved known‐key distinguishers on Feistel‐SP ciphers and application to Camellia – start-page: 461 year: 1990 end-page: 480 article-title: On the construction of block ciphers provably secure and not relying on any unproved hypotheses – start-page: 370 year: 2010 end-page: 392 article-title: Improved differential attacks for ECHO and Grøstl – start-page: 136 year: 2013 end-page: 148 article-title: Security analysis of GFN: 8‐round distinguisher for 4‐branch type‐2 GFN – start-page: 181 year: 2007 end-page: 195 article-title: The 128‐bit blockcipher CLEFIA – start-page: 300 year: 2010 end-page: 314 article-title: Practical rebound attack on 12‐round Cheetah‐256 – year: 1998 article-title: The RC6TM block cipher – start-page: 208 year: 2011 end-page: 221 article-title: New impossible differential and known‐key distinguishers for the 3D cipher – start-page: 55 year: 2012 end-page: 69 article-title: Known‐key distinguisher on round‐reduced 3d block cipher – start-page: 1 year: 2012 end-page: 17 article-title: Improved integral analysis on tweaked lesamnta – start-page: 60 year: 2009 end-page: 76 article-title: Distinguishers for ciphers and known key attack against Rijndael with large blocks – start-page: 260 year: 2009 end-page: 276 article-title: The rebound attack: Ccryptanalysis of reduced Whirlpool and Grøstl – start-page: 126 year: 2009 end-page: 143 article-title: Rebound distinguishers: results on the full Whirlpool compression function – start-page: 265 year: 2012 end-page: 282 article-title: Double‐SP is weaker than single‐SP: rebound attacks on Feistel ciphers with several rounds – start-page: 106 year: 2011 end-page: 119 article-title: Double SP‐functions: enhanced generalized Feistel networks – volume: 95 start-page: 1550 issue: 9 year: 2012 end-page: 1560 article-title: Known‐key attacks on generalized Feistel schemes with SP round function publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci. – volume: 95 start-page: 1550 issue: 9 year: 2012 ident: e_1_2_7_10_2 article-title: Known‐key attacks on generalized Feistel schemes with SP round function publication-title: IEICE Trans. Fundam. Electron., Commun. Comput. Sci. – ident: e_1_2_7_7_2 doi: 10.1007/978-3-642-27890-7_5 – ident: e_1_2_7_15_2 doi: 10.1007/978-3-540-74619-5_12 – ident: e_1_2_7_20_2 doi: 10.1007/978-3-642-05445-7_2 – ident: e_1_2_7_6_2 doi: 10.1007/978-3-642-31448-3_7 – ident: e_1_2_7_17_2 doi: 10.1007/3-540-48329-2_31 – ident: e_1_2_7_18_2 doi: 10.1007/3-540-45708-9_21 – ident: e_1_2_7_5_2 doi: 10.1007/978-3-642-21702-9_23 – ident: e_1_2_7_16_2 doi: 10.1007/978-3-642-24209-0_3 – ident: e_1_2_7_22_2 doi: 10.1007/978-3-642-13858-4_21 – ident: e_1_2_7_21_2 doi: 10.1007/978-3-642-10366-7_8 – ident: e_1_2_7_9_2 doi: 10.1007/978-3-642-31912-9_1 – ident: e_1_2_7_2_2 doi: 10.1007/978-3-540-76900-2_19 – ident: e_1_2_7_25_2 doi: 10.1007/978-3-642-05445-7_8 – ident: e_1_2_7_4_2 doi: 10.1007/978-3-642-34931-7_16 – ident: e_1_2_7_12_2 doi: 10.1007/978-3-642-22497-3_8 – ident: e_1_2_7_24_2 doi: 10.1007/978-3-642-10366-7_7 – ident: e_1_2_7_11_2 doi: 10.1007/0-387-34805-0_42 – ident: e_1_2_7_8_2 doi: 10.1007/978-3-642-21031-0_16 – ident: e_1_2_7_19_2 doi: 10.1007/978-3-642-03317-9_16 – ident: e_1_2_7_14_2 – ident: e_1_2_7_26_2 doi: 10.1007/978-3-642-13858-4_16 – ident: e_1_2_7_13_2 doi: 10.1007/978-3-319-03515-4_9 – ident: e_1_2_7_3_2 doi: 10.1007/978-3-642-02384-2_5 – ident: e_1_2_7_23_2 doi: 10.1007/978-3-642-14623-7_20 – ident: e_1_2_7_27_2 doi: 10.1007/978-3-642-25385-0_14 – ident: e_1_2_7_28_2 doi: 10.1007/978-3-642-14423-3_20 |
| SSID | ssj0056509 |
| Score | 2.0123565 |
| Snippet | Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions. The round function of the network often chooses a... |
| SourceID | proquest crossref wiley iet |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 277 |
| SubjectTerms | 15‐round 4‐branch type‐2 generalised Feistel networks 15‐round near‐collision attacks 4‐branch type‐2 GFN block ciphers Blocking Compressing Computer information security Construction Cryptography differential cryptanalysis double SP‐functions Encryption file organisation hash functions hashing modes known‐key distinguishers linear cryptanalysis linear layer Matyas–Meyer–Oseas Miyaguchi–Preneel compression function modes near‐collision attacks Networks rebound attack techniques single SP‐function single substitution permutation functions SP transformation SP‐layers subkey XOR substitution permutation transformation S‐boxes layer Transformations (mathematics) |
| Title | Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2014.0402 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ifs.2014.0402 https://www.proquest.com/docview/1816065901 |
| Volume | 9 |
| WOSCitedRecordID | wos000359750000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-8717 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8717 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bi9QwFA7r6oMvrld2vBFFfBCqTZPeHnWZ4oAMC7vivoUkTXYLQ2eYdnzenyD4d_w1-0s8J2lHB2EF8aW0aZoGzjU5J-cj5JUoBeeidJGwLocFSp5HOstNVODamaXKaetL5n_K5_Pi7Kw83iNH41mYUB9iu-GGkuH1NQq40gGFBJxaIGJj-6hxWHGbibfAiqCHbzLGc2TtRByP6jjFEnH-VGTKQPTjchvaLN_9McSOcboBr3f8zt-9V29-qoP_MvG75M7gfdL3gV3ukT3b3icHI7IDHQT9AfmBaNjt1eU3EHFaoxpozzche54uW8pSeLVGQCYq4E4jOMcFxd1ceEroeShl3XS2ppVFPlrQNqSbdxQ3filuUCws7UBr-VQFYI6ry-8rsBKbkBpA0d56kaAK_tKCPMLQyLT-LDxVfY_FAXAyTd_RiwAJRRHXp3tIPlfT06OP0YDzEBlY3ZWRUdpacDyyvGacJRZcUqc0WFcrjC1cHTNTGs0TVRfMcVdYUTvFmVFC88zGgj8i--2ytYeEal7oJE-cwjL-Clw_njGNWH0sdWWd6AmJRwJLMxRBRyyOhfTBeFFKoI4E6kikjkTqTMib7SerUAHkus6vsW3QA911HV_udJxNT-WsOvnVQa5qNyEvRu6TIPUYylGtXW5g3IJlGBGP2YRwz2x_n5ucnUyTD5UPhj7-p6-ekNvQnoYUu6dkv19v7DNyy3ztm2793IsdXL_M5j8BzdE6bw |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bixMxFA7rKuiL6xXrNYr4IIxOJpnbo5cOW6xlYSvsW0hmkt2BMi2dqc_7EwT_jr9mf4nnJDPVIqwgvrWdM2ngXHPOyXcIeSlywbnIbSCMTeGAkqaBTtIyyPDszGJltXGQ-dN0NstOTvKjPfJxuAvj8SG2CTfUDGevUcExIe0PnAJBMmvTBbVFyG0m3oAsgiG-KsDb4ByDSBwN9jhGjDh3LTJmoPthvq1t5m__WGLHO12BxzuB5-_hq_M_xcH_2fktcrOPP-k7LzC3yZ5p7pCDYbYD7VX9LvmB87Cbi_NvoOS0QkPQnG58_zxdNpTF8GiNI5mogE8ax3OcUcznwreInnow67o1FS0MStKCNr7hvKWY-qWYolgY2oLdcs0KIB4X599X4Cc2vjmAosd1SkEV_EsDGglLo9i62_BUdR3CA-Bm6q6lZ34oFMXJPu098qUYzz8cBv2kh6CE810elEobA6FHklaMs8hAUGqVBv9qRGkyW4WszEvNI1VlzHKbGVFZxVmphOaJCQW_T_abZWMeEKp5pqM0sgqB_BUEfzxhGqf1sdjmVaRHJBw4LMseBh2ncSykK8eLXAJ3JHBHInckcmdEXm9fWXkMkMuIX-FvvSVoLyN8sUM4Gc_lpDj-RSBXlR2R54P4SdB7LOaoxiw3sG7GEqyJh2xEuJO2v-9NTo7H0fvClUMf_tNbz8j1w_nnqZxOZp8ekRtAE_uGu8dkv1tvzBNyrfza1e36qdPBn9rDPUI |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bi9QwFA7rKuKL6xVnvUURH4SuTZPeHtWd4uAyDOwK-xaSNtktDJ1h2tnn_QmCf8dfs7_Ec5J2dBBWEN96OU0D55qck-8Q8kbkgnOR20AYm8ICJU0DnaRlkOHamcXKauMg84_S6TQ7Pc1nO-RwOAvj8SE2G26oGc5eo4KbZWX9glMgSGZtuqC2CLnNxAHIIhjimyIGW4v4zmI22OMYMeLcsciYge6H-Sa3mb__Y4gt73QDXm8Fnr-Hr87_FHv_Z-b3yN0-_qQfvMDcJzumeUD2ht4OtFf1h-QH9sNuri6_gZLTCg1Bc7b29fN00VAWw6sVtmSiAq40tuc4p7ifC3cRPfNg1nVrKloYlKQ5bXzBeUtx65fiFsXc0BbslitWAPG4uvy-BD-x9sUBFD2uUwqq4C8NaCQMjWLrTsNT1XUID4CTqbuWnvumUBQ7-7SPyNdifPLpc9B3eghKWN_lQam0MRB6JGnFOIsMBKVWafCvRpQms1XIyrzUPFJVxiy3mRGVVZyVSmiemFDwx2S3WTTmCaGaZzpKI6sQyF9B8McTprFbH4ttXkV6RMKBw7LsYdCxG8dcunS8yCVwRwJ3JHJHIndG5N3mk6XHALmO-C0-6y1Bex3h6y3CyfhETorjXwQShGZEXg3iJ0HvMZmjGrNYw7gZSzAnHrIR4U7a_j43OTkeRx8Llw7d_6evXpLbs8NCHk2mX56SO0AS-3q7Z2S3W63Nc3KrvOjqdvXCqeBPL6U8xg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Known%E2%80%90key+distinguishers+on+15%E2%80%90round+4%E2%80%90branch+type%E2%80%902+generalised+Feistel+networks+with+single+substitution%E2%80%93permutation+functions+and+near%E2%80%90collision+attacks+on+its+hashing+modes&rft.jtitle=IET+information+security&rft.au=Dong%2C+Le&rft.au=Wang%2C+Yanling&rft.au=Wu%2C+Wenling&rft.au=Zou%2C+Jian&rft.date=2015-09-01&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8709&rft.eissn=1751-8717&rft.volume=9&rft.issue=5&rft.spage=277&rft.epage=283&rft_id=info:doi/10.1049%2Fiet-ifs.2014.0402&rft.externalDBID=10.1049%252Fiet-ifs.2014.0402&rft.externalDocID=ISE2BF00109 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8709&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8709&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8709&client=summon |