Feistel

Results: 135



#Item
11The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
12On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M.  CTCryptYaroslavl

On Efficiency of Block Encryption by Improved Key Schedule Fomichev V.M. Koreneva A.M. CTCryptYaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:36:02
13Homogeneous Permutations. Random Feistel schemes are never homogeneous Jacques Patarin Abstract In this paper we introduce two new concepts that are stronger than strong

Homogeneous Permutations. Random Feistel schemes are never homogeneous Jacques Patarin Abstract In this paper we introduce two new concepts that are stronger than strong

Add to Reading List

Source URL: www.prism.uvsq.fr

Language: English - Date: 2011-01-18 17:28:04
    14Random Feistel Schemes: security in m  23n/4 for ≥ 6 rounds Jacques Patarin Abstract This paper is a continuation of the work initiated in [2] by M. Luby and

    Random Feistel Schemes: security in m  23n/4 for ≥ 6 rounds Jacques Patarin Abstract This paper is a continuation of the work initiated in [2] by M. Luby and

    Add to Reading List

    Source URL: www.prism.uvsq.fr

    Language: English - Date: 2011-01-18 17:28:07
      15ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

      ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-04-14 13:47:17
      16Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

      Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:37:38
      17FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

      FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2012-05-16 03:47:37
      18Generic Attacks on Feistel Schemes -Extended Version- Jacques Patarin ´ PRiSM, University of Versailles, 45 av. des Etats-Unis,

      Generic Attacks on Feistel Schemes -Extended Version- Jacques Patarin ´ PRiSM, University of Versailles, 45 av. des Etats-Unis,

      Add to Reading List

      Source URL: www.prism.uvsq.fr

      Language: English - Date: 2011-01-18 17:28:05
        19Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1  3

        Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2015-10-09 09:52:07
          20Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

          Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

          Add to Reading List

          Source URL: seclab.cs.ucdavis.edu

          Language: English - Date: 2004-06-21 18:50:20