Feistel cipher

Results: 113



#Item
71Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
72Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:03
73Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
74Keystream / RC4 / Scream / Block cipher / Pseudorandom number generator / Feistel cipher / KFB mode / Index of cryptography articles / Stream ciphers / Cryptography / QUAD

On the Security of IV Dependent Stream Ciphers

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
75Advanced Encryption Standard / MISTY1 / Triple DES / Block cipher / Horst Feistel / Feistel / Differential cryptanalysis / Camellia / Encryption by date / Cryptography / Data Encryption Standard / Feistel cipher

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
76Permutations / Feistel cipher / SIMD / Parity of a permutation / Mathematics / Combinatorics / Computing

Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-09-21 12:40:43
77Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
78ICE / Key schedule / Block cipher / Cryptanalysis / Differential of a function / Differential / Boomerang attack / FEAL / Cryptography / Differential cryptanalysis / Feistel cipher

BRICS BRICS RS-95-9

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1996-10-15 07:49:33
79XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
80KASUMI / Feistel cipher / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / ICE / Key schedule / Linear cryptanalysis / DEAL / Cryptography / MISTY1 / Data Encryption Standard

Supporting Document of MISTY1 Version[removed]Supporting Document of MISTY1

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2006-09-01 06:41:16
UPDATE