The following publications are possibly variants of this publication:
- Automated Meet-in-the-Middle Attack Goes to FeistelQingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang. iacr, 2023:1359, 2023. [doi]
- Meet-in-the-Middle Attacks on 3-Line Generalized Feistel NetworksLe Dong, Yongxia Mao. iacr, 2017:1071, 2017. [doi]
- Meet-in-the-Middle Attacks on Generic Feistel ConstructionsJian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki. asiacrypt 2014: 458-477 [doi]
- Extended meet-in-the-middle attacks on some Feistel constructionsJian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki. dcc, 80(3):587-618, 2016. [doi]
- Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel ConstructionsJian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki. tosc, 2016(2):307-337, 2016. [doi]
- Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel ConstructionsJian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki. iacr, 2016:1162, 2016. [doi]