Return to Article Details Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks Download Download PDF