References
- A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CHC Press, 1997
- H. Feistcl, 'Cryptography and Computer Privacy,' Scientific American, vol. 228,. pp. 15-23, 1973
- H. Feistel, W.A. Nots, 'Some Cryptographic Techniques for Machine-to-Machine Data Communications,' Proc. of the IEEE, vol. 63, pp 1545-1554, 1975
- M. Luby, C. Rackoff, 'How to construct pseudorandom permutations from pseudorandom functions,' SIAM J. Comput., vol. 17, pp. 373--386, 1988 https://doi.org/10.1137/0217022
- U.M. Maurer, 'A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generators,' Advances in Cryptology - EUROCHYPT '92, Lecture Notes in Computer Science, vol. 658, Springer-Verlag, Berlin, pp. 239-255, 1992
- J. Patarin, 'How to construct pseudorandom and super pseudorandom permutation from one single pseudorandom function,' Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, Springer-Verlag, Berlin, pp, 256-266, 1992
- J. Pieprzyk, 'How to construct pseudorandom permutations from single pseudorandom functions,' Advances in Cryptology - EUROCRYPT '90, Lecture Notes in Computer Science, vol. 473, Springer- Verlag, Berlin, pp, 140-150, 1991
- B. Sadeghiyan, J. Pieprzyk, 'A construction for super pseudorandom permutations from a single pseudorandom function,' Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, Springer-Verlag, Berlin, pp, 267-284, 1992
- Y. Zheng, T. Matsumoto, and H. Imai, 'Impossibility and optimality results on constructing pseudorandom permutations,' Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, Springer-Verlag, Berlin, pp. 412-422, 1990
- B. Schneier, J. Kelsey, 'Unbalanced Feistel Networks and Block-Cipher Design,' Proc. Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, Springer-Verlag, Berlin, pp, 121-144, 1996 https://doi.org/10.1007/3-540-60865-6_49
- C.S. Jutla, 'Generalized Birthday Attacks on Unbalanced Feistel Networks,' Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, vol. 1462, Springer-Verlag, Berlin, pp. 186-199, 1998
- M. Naor, O. Reingold, 'On the Construction of Pseudorandom Permutations: Lubv-Rackoff Revisited,' J. Cryptology, vol. 12, pp. 29-66, 1999 https://doi.org/10.1007/PL00003817
- O. Goldreich, Foundations of Cryptography (Fragments of book), available on line http://theory. lcs.mit.edu/-oded/, 1998