Feistel

Results: 135



#Item
51Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey†  Doug Whiting‡

Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
52Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
53Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1  Department of Mathematics and System Science, Science College,

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
54On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
55Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin1 , Val´erie Nachef2 , and Cˆome Berbain3 1 Universit´e de Versailles 45 avenue des Etats-Unis, 78035 Versailles Cedex, France

Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin1 , Val´erie Nachef2 , and Cˆome Berbain3 1 Universit´e de Versailles 45 avenue des Etats-Unis, 78035 Versailles Cedex, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 08:31:35
56A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 14:42:30
57I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 08:53:09
58Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29
59Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-22 12:08:36
60A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1  Department of Computer Science and Engineering, Shanghai Jiaotong University

A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-06 23:14:46