Feistel cipher

Results: 113



#Item
31Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
32F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
33Twofish Technical Report #5  Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
34Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey†  Doug Whiting‡

Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
35Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
36Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1  Department of Mathematics and System Science, Science College,

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
37On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
38A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 14:42:30
39I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 08:53:09
40Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29