Feistel cipher

Results: 113



#Item
41A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1  Department of Computer Science and Engineering, Shanghai Jiaotong University

A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-06 23:14:46
42Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
43On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 03:14:54
44LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
45Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
46Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
47Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
48Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-16 22:19:01
49The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
50On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38