Feistel

Results: 135



#Item
61Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
62Abstract algebra / Linear algebra / Matrix / Function / Feistel cipher / Pseudorandom permutation / Vector space / Algebra / Mathematics / Functions and mappings

On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 03:14:54
63Feistel cipher / ICE / Block cipher / Advanced Encryption Standard / Advantage / Permutations / Data Encryption Standard / Cryptography / Keccak / NIST hash function competition

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
64Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
65Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
66CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
67MUGI / MISTY1 / Cipher / Feistel cipher / Block size / Q / Symmetric-key algorithm / RC4 / SNOW / Cryptography / Stream ciphers / Block cipher

Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-16 22:19:01
68Camellia / Twofish / ICE / Key whitening / Matrix / Feistel / Cryptography / Block ciphers / Feistel cipher

The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
69Electronics / Acoustics / Loudspeaker / Line array / Program optimization / Mathematical optimization / Sound pressure / Decibel / Audio power / Audio electronics / Waves / Sound

AFMG Ahnert Feistel Media Group Software-Engineering | Research | Development AFMG FIRmaker

Add to Reading List

Source URL: www.worxaudio.com

Language: English - Date: 2014-11-10 11:05:02
70Feistel cipher / Cipher / Linear cryptanalysis / Cryptanalysis / Block ciphers / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Q

On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
UPDATE