21![On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology](https://www.pdfsearch.io/img/a0814bb4fdf23df177a5d330221a126f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-06-25 11:49:37
|
---|
22![On Fault Injections in Generalized Feistel Networks On Fault Injections in Generalized Feistel Networks](https://www.pdfsearch.io/img/27fcb12077dcc9e9a7de3d4fa08a8d7e.jpg) | Add to Reading ListSource URL: conferenze.dei.polimi.itLanguage: English - Date: 2014-10-24 13:14:35
|
---|
23![Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science](https://www.pdfsearch.io/img/6b0b1c8327235979ccef0dd527ca8774.jpg) | Add to Reading ListSource URL: pub.ist.ac.atLanguage: English - Date: 2014-06-19 16:51:50
|
---|
24![Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia](https://www.pdfsearch.io/img/7e370f6a8dc322ea21bfeda93bdb5162.jpg) | Add to Reading ListSource URL: pub.ist.ac.atLanguage: English - Date: 2014-06-19 17:26:59
|
---|
25![Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo](https://www.pdfsearch.io/img/58c45d778d2847ca2682728530a325eb.jpg) | Add to Reading ListSource URL: www.dgalindo.esLanguage: English - Date: 2007-11-26 10:35:45
|
---|
26![Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 , Emmanuel Volte1 , and Jacques Patarin2 1 Department of Mathematics, University of Cergy-Pontoise, CNRS UMR 8088 Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 , Emmanuel Volte1 , and Jacques Patarin2 1 Department of Mathematics, University of Cergy-Pontoise, CNRS UMR 8088](https://www.pdfsearch.io/img/67e54861e58a58f47105d0f1dd5dd57c.jpg) | Add to Reading ListSource URL: www.prism.uvsq.frLanguage: English - Date: 2015-04-03 07:32:23
|
---|
27![Luby-Rackoff: 7 Rounds are Enough for 2n(1−ε) Security Jacques Patarin, University of Versailles, France Abstract In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all ad Luby-Rackoff: 7 Rounds are Enough for 2n(1−ε) Security Jacques Patarin, University of Versailles, France Abstract In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all ad](https://www.pdfsearch.io/img/bf9312432842bb150046cb47928b367b.jpg) | Add to Reading ListSource URL: www.prism.uvsq.frLanguage: English - Date: 2011-01-18 17:27:57
|
---|
28![Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method C´eline Blondeau1 and Marine Minier2 1 Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method C´eline Blondeau1 and Marine Minier2 1](https://www.pdfsearch.io/img/1be5a3e9bc272f79051c10307850e38a.jpg) | Add to Reading ListSource URL: users.ics.aalto.fiLanguage: English - Date: 2015-03-31 03:25:05
|
---|
29![Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http: Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:](https://www.pdfsearch.io/img/9c871df999cb07875c509a638db67764.jpg) | Add to Reading ListSource URL: jda.noekeon.orgLanguage: English - Date: 2013-08-28 07:53:16
|
---|
30![Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method ´ Celine Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method ´ Celine](https://www.pdfsearch.io/img/389d5e5bf0837dbbe3cfd4b69d39021a.jpg) | Add to Reading ListSource URL: users.ics.aalto.fiLanguage: English - Date: 2015-03-31 03:22:14
|
---|