Feistel cipher

Results: 113



#Item
21Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:44
22ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF REASEARCH IN SCIENCE & TECHNOLOGY www.abhinavjournal.com  A RELIABLE APPROACH TOWARDS SECURE

ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF REASEARCH IN SCIENCE & TECHNOLOGY www.abhinavjournal.com A RELIABLE APPROACH TOWARDS SECURE

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:14:22
23This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
24Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
25Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
26Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
27Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
28LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
29Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1  Department of Mathematics

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
30

PDF Document

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21