Feistel

Results: 135



#Item
41Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
42Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
43Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
44Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
45LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
46Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1  Department of Mathematics

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
47

PDF Document

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21
48Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
49F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
50Twofish Technical Report #5  Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31