Feistel

Results: 135



#Item
31

Generic Attacks on Feistel Schemes Jacques Patarin1,2 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-12-12 19:25:24
    32

    State-of-the-art review on vertical mixing in the Baltic Sea and consequences for eutrophication Jan Hinrich Reissmann, Hans Burchard, Rainer Feistel, Eberhard Hagen, Hans Ulrich Lass, Volker Mohrholz, Günther Nausch, L

    Add to Reading List

    Source URL: www.balticsea2020.org

    Language: English - Date: 2013-01-10 12:08:19
      33Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher

      Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-02-04 12:37:29
      34Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

      Christian Grothoff COMP 3704 Computer Security Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      Language: English - Date: 2011-06-21 07:45:42
      35Ciphertext / Feistel cipher / Advanced Encryption Standard / Cipher / Advantage / Block cipher modes of operation / Ciphertext stealing / Format-preserving encryption / Cryptography / Block cipher / Block ciphers

      Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2015-05-23 10:19:24
      36Feistel cipher / Ciphertext / Stream cipher / Cipher / Advantage / Keystream / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher modes of operation / Block cipher

      Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2014-04-22 13:24:19
      37ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

      Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

      Add to Reading List

      Source URL: www.cryptrec.go.jp

      Language: English - Date: 2012-06-28 04:48:44
      38Aquatic ecology / Chemical oceanography / Inorganic solvents / Oxides / Oxygen / Baltic Sea / Gotland Basin / Seawater / Hypoxia / Chemistry / Matter / Water

      October 2003 Indicator Report WATER EXCHANGE BETWEEN THE BALTIC SEA AND THE NORTH SEA AND CONDITIONS IN THE DEEP BASINS Editor(s): Rainer Feistel and Günther Nausch, IOW Key message

      Add to Reading List

      Source URL: www.io-warnemuende.de

      Language: English - Date: 2008-10-07 09:58:12
      39Crypt / Feistel cipher / DEAL / ICE / Block cipher / Bcrypt / Key schedule / Cryptography / Blowfish / Data Encryption Standard

      ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF REASEARCH IN SCIENCE & TECHNOLOGY www.abhinavjournal.com A RELIABLE APPROACH TOWARDS SECURE

      Add to Reading List

      Source URL: www.abhinavjournal.com

      Language: English - Date: 2014-01-30 00:14:22
      40Index of cryptography articles / Stream cipher / FEAL / Cipher / WAKE / RC5 / Feistel cipher / Differential cryptanalysis / Cryptanalysis / Cryptography / Data Encryption Standard / Block cipher

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13
      UPDATE