Feistel cipher

Results: 113



#Item
61Feistel cipher / Cipher / Block cipher / PLATO / Cryptography / Data Encryption Standard / DEAL

Colloquium Spring[removed]Computer Science Colloquium Seventeenth Series - Spring 2003 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule Adv

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2010-09-07 14:47:13
62Symmetric-key algorithm / Cipher / Crypt / Feistel cipher / Block cipher / Key size / RC5 / ICE / Key / Cryptography / Key management / Blowfish

American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

Add to Reading List

Source URL: www.ajer.org

Language: English - Date: 2014-07-28 18:08:04
63Hierocrypt / MDS matrix / ICE / Advanced Encryption Standard / Feistel cipher / Matrix / Circulant matrix / Key schedule / Function / Cryptography / Mathematics / Block ciphers

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
64ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
65Block cipher / Block cipher modes of operation / Data Encryption Standard / Feistel cipher / Block size / Galois/Counter Mode / Outline of cryptography / Cryptography / Format-preserving encryption / Advanced Encryption Standard

Draft Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-07-08 10:45:13
66Advanced Encryption Standard / Mathematics / Format-preserving encryption / Feistel cipher / Radix

Addendum to “The FFX Mode of Operation for Format-Preserving Encryption” A parameter collection for enciphering strings of arbitrary radix and length M. Bellare1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:19:39
67Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
68Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
69Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
70Skipjack / Crypt / Blowfish / SHA-2 / Feistel cipher / Stream cipher / Cryptography / Cryptographic software / National Security Agency

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50
UPDATE