Feistel cipher

Results: 113



#Item
51KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
52Advanced Encryption Standard / Cipher / GOST / Feistel cipher / Linear cryptanalysis / ICE / Weak key / Symmetric-key algorithm / Serpent / Cryptography / Block ciphers / Key schedule

LNCS[removed]SEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
53Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
54Optimal asymmetric encryption padding / Advantage / Block cipher / ICE

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction∗ Jean-Sébastien Coron University of Luxembourg [removed]

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
55Cipher / Feistel cipher / Symmetric-key algorithm / QUAD / Public-key cryptography / Cryptanalysis / Vigenère cipher / Index of cryptography articles / Cryptography / Stream ciphers / Block cipher

A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
56MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
57Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
58Differential cryptanalysis / One-way compression function / Nimbus / Advanced Encryption Standard / Feistel cipher / Cryptography / Cryptographic hash functions / Block cipher

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
59Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
60Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
UPDATE