Feistel cipher

Results: 113



#Item
11Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
12Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-25 11:49:37
13Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
14Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 17:26:59
15Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
16Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:16
17Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
18Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2011-06-21 07:45:42
19Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
20Feistel cipher / Ciphertext / Stream cipher / Cipher / Advantage / Keystream / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher modes of operation / Block cipher

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19
UPDATE