<--- Back to Details
First PageDocument Content
Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher
Date: 2011-06-21 07:45:42
Cipher
Confusion and diffusion
Twofish
Substitution-permutation network
Data Encryption Standard
Cryptography
Block ciphers
Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Download Document from Source Website

File Size: 136,21 KB

Share Document on Facebook

Similar Documents

Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

DocID: 1qY1X - View Document

Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

DocID: 1q88i - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document