Feistel cipher

Results: 113



#Item
11Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
12On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-25 11:49:37
13Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
14Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1  Department of Computer Science, Comenius University, Bratislava, Slovakia

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 17:26:59
15Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
16Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:16
17Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
18Christian Grothoff  COMP 3704 Computer Security Christian Grothoff

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2011-06-21 07:45:42
19Security I – exercises Markus Kuhn Easter 2015 – CST Part IB  1

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
20Security I – exercises Markus Kuhn Lent 2014 – CST Part IB  1

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19