Feistel

Results: 135



#Item
1Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1  3

Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
2Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version? )?? Anne Canteaut, S´ebastien Duval, and Ga¨etan Leurent Inria, project-team SECRET, France {Anne.Canteaut, Sebastien.Duval, Gaetan.

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version? )?? Anne Canteaut, S´ebastien Duval, and Ga¨etan Leurent Inria, project-team SECRET, France {Anne.Canteaut, Sebastien.Duval, Gaetan.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
3Introduction  Security parameters Fixed-key Feistel & MISTY

Introduction Security parameters Fixed-key Feistel & MISTY

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
4Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2017-03-06 00:55:10
    5About Feistel Schemes with six (or more) Rounds Jacques Patarin – Extended Version –  Abstract

    About Feistel Schemes with six (or more) Rounds Jacques Patarin – Extended Version – Abstract

    Add to Reading List

    Source URL: www.prism.uvsq.fr

    Language: English - Date: 2011-01-18 16:26:08
      6Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

      Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-12-30 23:23:40
      7Proceedings  - NN - RFIDSec08

      Proceedings - NN - RFIDSec08

      Add to Reading List

      Source URL: events.iaik.tugraz.at

      Language: English - Date: 2008-07-17 01:40:17
      8D:/Documents/Courses/Winter 2014/aez/rae.dvi

      D:/Documents/Courses/Winter 2014/aez/rae.dvi

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-11-11 12:09:54
      9On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

      On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2010-12-10 03:09:04
      10A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

      A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

      Add to Reading List

      Source URL: cs-www.cs.yale.edu

      Language: English - Date: 2001-10-24 10:54:04