Feistel

Results: 135



#Item
91Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
92Skipjack / Crypt / Blowfish / SHA-2 / Feistel cipher / Stream cipher / Cryptography / Cryptographic software / National Security Agency

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50
93Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
94Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:03
95Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
96Keystream / RC4 / Scream / Block cipher / Pseudorandom number generator / Feistel cipher / KFB mode / Index of cryptography articles / Stream ciphers / Cryptography / QUAD

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
97Advanced Encryption Standard / MISTY1 / Triple DES / Block cipher / Horst Feistel / Feistel / Differential cryptanalysis / Camellia / Encryption by date / Cryptography / Data Encryption Standard / Feistel cipher

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
98Permutations / Feistel cipher / SIMD / Parity of a permutation / Mathematics / Combinatorics / Computing

Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-09-21 12:40:43
99Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
100ICE / Key schedule / Block cipher / Cryptanalysis / Differential of a function / Differential / Boomerang attack / FEAL / Cryptography / Differential cryptanalysis / Feistel cipher

BRICS BRICS RS-95-9

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1996-10-15 07:49:33
UPDATE