Feistel

Results: 135



#Item
21On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-25 11:49:37
22On Fault Injections in  Generalized Feistel Networks

On Fault Injections in Generalized Feistel Networks

Add to Reading List

Source URL: conferenze.dei.polimi.it

Language: English - Date: 2014-10-24 13:14:35
    23Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

    Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-06-19 16:51:50
    24Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1  Department of Computer Science, Comenius University, Bratislava, Slovakia

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-06-19 17:26:59
    25Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:45
    26Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 , Emmanuel Volte1 , and Jacques Patarin2 1  Department of Mathematics, University of Cergy-Pontoise, CNRS UMR 8088

    Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 , Emmanuel Volte1 , and Jacques Patarin2 1 Department of Mathematics, University of Cergy-Pontoise, CNRS UMR 8088

    Add to Reading List

    Source URL: www.prism.uvsq.fr

    Language: English - Date: 2015-04-03 07:32:23
      27Luby-Rackoff: 7 Rounds are Enough for 2n(1−ε) Security Jacques Patarin, University of Versailles, France Abstract In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all ad

      Luby-Rackoff: 7 Rounds are Enough for 2n(1−ε) Security Jacques Patarin, University of Versailles, France Abstract In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all ad

      Add to Reading List

      Source URL: www.prism.uvsq.fr

      Language: English - Date: 2011-01-18 17:27:57
        28Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method C´eline Blondeau1 and Marine Minier2 1

        Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method C´eline Blondeau1 and Marine Minier2 1

        Add to Reading List

        Source URL: users.ics.aalto.fi

        Language: English - Date: 2015-03-31 03:25:05
          29Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

          Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

          Add to Reading List

          Source URL: jda.noekeon.org

          Language: English - Date: 2013-08-28 07:53:16
          30Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method ´ Celine

          Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method ´ Celine

          Add to Reading List

          Source URL: users.ics.aalto.fi

          Language: English - Date: 2015-03-31 03:22:14