“…In Ref. [
81], the offline‐Simon algorithm was extended to target more constructions and in particular, constructions of the form:
with two independent block cipher calls keyed by k . Any classical key‐recovery attack requires time Ω(2 5 n /2 ), and the best attack requires also Ω(2 n /2 ) memory.…”