Return to Article Details Truncated Differential Attacks on Contracting Feistel Ciphers Download Download PDF