Feistel cipher

Results: 113



#Item
513-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
52LNCS[removed]SEA: A Scalable Encryption Algorithm for Small Embedded Applications

LNCS[removed]SEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
53J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
54How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction∗ Jean-Sébastien Coron University of Luxembourg [removed]

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction∗ Jean-Sébastien Coron University of Luxembourg [removed]

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
55A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
56A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
57Chapter  Cryptographic Tools and Techniques  1

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
58Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
59Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
60NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21