Feistel

Results: 135



#Item
11Cryptography / Disk encryption theory / Block cipher / Feistel cipher / Malleability / Advantage / Ciphertext indistinguishability

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
12GOST standards / Feistel cipher / GOST

On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M. CTCryptYaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:36:02
13

Homogeneous Permutations. Random Feistel schemes are never homogeneous Jacques Patarin Abstract In this paper we introduce two new concepts that are stronger than strong

Add to Reading List

Source URL: www.prism.uvsq.fr

Language: English - Date: 2011-01-18 17:28:04
    14

    Random Feistel Schemes: security in m  23n/4 for ≥ 6 rounds Jacques Patarin Abstract This paper is a continuation of the work initiated in [2] by M. Luby and

    Add to Reading List

    Source URL: www.prism.uvsq.fr

    Language: English - Date: 2011-01-18 17:28:07
      15Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

      ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-04-14 13:47:17
      16Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

      Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:37:38
      17Cryptography / Format-preserving encryption / Feistel cipher / Cipher / Block cipher mode of operation / Data Encryption Standard / Symmetric-key algorithm / Initialization vector / RSA / Block size / IEEE P1619 / Advanced Encryption Standard

      FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2012-05-16 03:47:37
      18

      Generic Attacks on Feistel Schemes -Extended Version- Jacques Patarin ´ PRiSM, University of Versailles, 45 av. des Etats-Unis,

      Add to Reading List

      Source URL: www.prism.uvsq.fr

      Language: English - Date: 2011-01-18 17:28:05
        19

        Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2015-10-09 09:52:07
          20Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

          Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

          Add to Reading List

          Source URL: seclab.cs.ucdavis.edu

          Language: English - Date: 2004-06-21 18:50:20
          UPDATE