|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 115 occurrences of 64 keywords
|
|
|
Results
Found 440 publication records. Showing 433 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
139 | Yevgeniy Dodis, Prashant Puniya |
Feistel Networks Made Public, and Applications. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network |
125 | Jacques Patarin |
Generic Attacks on Feistel Schemes. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations |
111 | Taizo Shirai, Kyoji Shibutani |
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
active S-boxes, multiple MDS design, MDS, Feistel cipher |
89 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
83 | Taizo Shirai, Kyoji Shibutani |
On Feistel Structures Using a Diffusion Switching Mechanism. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Feistel structure, optimal diffusion mappings, blockcipher |
83 | Taizo Shirai, Bart Preneel |
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
optimal diffusion mapping, active S-boxes, MDS, Feistel cipher |
68 | Atsushi Mitsuda, Tetsu Iwata |
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher |
68 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
68 | Charanjit S. Jutla |
Generalized Birthday Arracks on Unbalanced Feistel Networks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
second moment method, Block ciphers, birthday attacks, pseudo-random permutations, Feistel networks |
61 | Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi |
SCARE of an Unknown Hardware Feistel Implementation. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
61 | William Aiello, Ramarathnam Venkatesan |
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
57 | Eli Biham |
Cryptanalysis of Ladder-DES. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
54 | Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap |
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers |
54 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations |
54 | Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri |
Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks |
50 | Paul Crowley |
Mercy: A Fast Large Block Cipher for Disk Sector Encryption. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher |
47 | Gilles Piret |
Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
47 | Nicolas T. Courtois |
Feistel Schemes and Bi-linear Cryptanalysis. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Jacques Patarin |
Security of Random Feistel Schemes with 5 or More Rounds. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Lars R. Knudsen |
The Security of Feistel Ciphers with Six Rounds or Less. |
J. Cryptol. |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Masayuki Kanda |
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Reihaneh Safavi-Naini |
Feistel Type Authentication Codes. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
43 | Shuai Chen, XianXin Zhong, Zhengzhong Wu |
Chaos block cipher for wireless sensor network. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
discrete chaos, encryption function, single byte, wireless sensor network, block cipher |
43 | Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin |
Luby-Rackoff Ciphers from Weak Round Functions? |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Ueli M. Maurer, Krzysztof Pietrzak |
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang |
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Fault Propagation Pattern, Fault Propagation Path, Camellia, Feistel Cipher, Differential Fault Analysis |
37 | Emmanuel Volte |
Miroirs, Cubes et Feistel Dissymétriques. (Mirrors, cubes and unbalanced Feistel schemes). |
|
2014 |
RDF |
|
37 | Aleksandra Mileva, Smile Markovski |
Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers. |
ICT Innovations |
2012 |
DBLP DOI BibTeX RDF |
|
36 | G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha |
Performance Enhancement of CAST-128 Algorithm by modifying its function. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext |
36 | Lars R. Knudsen, Vincent Rijmen |
Known-Key Distinguishers for Some Block Ciphers. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers |
36 | Hua Chen 0011, Wenling Wu, Dengguo Feng |
Differential Fault Analysis on CLEFIA. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Generalized Feistel Structure, Differential Fault Attack, Block Cipher |
36 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network |
36 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
36 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
36 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
35 | Rainer Feistel |
Self-Organisation of Prediction Models. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Olaf Hellmuth, Jürn W. P. Schmelzer, Rainer Feistel |
Ice-Crystal Nucleation in Water: Thermodynamic Driving Force and Surface Tension. Part I: Theoretical Foundation. |
Entropy |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Olaf Hellmuth, Rainer Feistel |
Analytical Determination of the Nucleation-Prone, Low-Density Fraction of Subcooled Water. |
Entropy |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Wenke Markgraf, Jannis Lilienthal, Philipp Feistel, Christine Thiele, Hagen Malberg |
Algorithm for Mapping Kidney Tissue Water Content during Normothermic Machine Perfusion Using Hyperspectral Imaging. |
Algorithms |
2020 |
DBLP DOI BibTeX RDF |
|
35 | Tanja Auge, Erik Manthey, Susanne Jürgensmann, Susanne Feistel, Andreas Heuer 0001 |
Schema Evolution and Reproducibility of Long-term Hydrographic Data Sets at the IOW. |
LWDA |
2020 |
DBLP BibTeX RDF |
|
35 | Rainer Feistel |
Distinguishing between Clausius, Boltzmann and Pauling Entropies of Frozen Non-Equilibrium States. |
Entropy |
2019 |
DBLP DOI BibTeX RDF |
|
35 | Karin R. Feistel, Luiz A. C. Lopes |
Design procedure for the LPF of a three-phase SPWM VSC operating with a wide range of output power, voltage and frequency with low harmonic distortion. |
ICIT |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Ilvio Bruder, Meike Klettke, Mark Lukas Möller, Frank Meyer, Andreas Heuer 0001, Susanne Jürgensmann, Susanne Feistel |
Daten wie Sand am Meer - Datenerhebung, -strukturierung, -management und Data Provenance für die Ostseeforschung. |
Datenbank-Spektrum |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Mark Burgin, Rainer Feistel |
Structural and Symbolic Information in the Context of the General Theory of Information. |
Inf. |
2017 |
DBLP DOI BibTeX RDF |
|
35 | G. Sivanagaraju, Suvendu Samanta, Luccas M. Kunzler, Karin R. Feistel, Akshay K. Rathore, Luiz A. Lopes |
PFC interleaved buck-boost converter for telecom power application. |
IECON |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Rainer Feistel, Werner Ebeling |
Entropy and the Self-Organization of Information and Value. |
Entropy |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Stoycho Stefanov, Angela Feistel, Slawomir Stanczak |
Two Stage Power Control in Multi-cell Wireless Networks. |
EW |
2011 |
DBLP BibTeX RDF |
|
35 | Angela Feistel |
A Theoretical Framework for MAC-layer Design in Wireless Networks. |
|
2011 |
RDF |
|
35 | Angela Feistel, Slawomir Stanczak, Daniel Tomecki |
Joint Utility-Based Power Control and Receive Beamforming in Decentralized Wireless Networks. |
EURASIP J. Wirel. Commun. Netw. |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Slawomir Stanczak, Angela Feistel, Marcin Wiczanowski, Holger Boche |
Utility-based power control with QoS support. |
Wirel. Networks |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Iordanis Koutsopoulos, Slawomir Stanczak, Angela Feistel |
Transmit Rate Control for Energy-Efficient Estimation in Wireless Sensor Networks. |
GLOBECOM |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Slawomir Stanczak, Angela Feistel, Holger Boche |
QoS support with utility-based power control. |
ISIT |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Slawomir Stanczak, Angela Feistel, Holger Boche, Marcin Wiczanowski |
Towards efficient and fair resource allocation in wireless networks. |
WiOpt |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Angela Feistel, Slawomir Stanczak |
Hop-by-Hop Congestion Control with Power Control for Wireless Mesh Networks. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Slawomir Stanczak, Angela Feistel, Daniel Tomecki |
On Utility-Based Power Control and Receive Beamforming. |
CISS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Angela Feistel, Slawomir Stanczak |
Dynamic resource allocation in wireless ad hoc networks based on QS-CDMA. |
PIMRC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | M. Feistel, A. Baier |
Performance of a three-dimensional propagation model in urban environments. |
PIMRC |
1995 |
DBLP DOI BibTeX RDF |
|
35 | Heinrich Niemann, Horst Bunke, Ingrid Hofmann, Gerhard Sagerer, Friedrich Wolf, Herbert Feistel |
A Knowledge Based System for Analysis of Gated Blood Pool Studies. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1985 |
DBLP DOI BibTeX RDF |
|
35 | Horst Bunke, Herbert Feistel, Ingrid Hofmann, Heinrich Niemann, Gerhard Sagerer |
Ein wissensbasiertes System zur automatischen Auswertung von Bildsequenzen des menschlichen Herzens. |
DAGM-Symposium |
1984 |
DBLP DOI BibTeX RDF |
|
33 | Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park |
A New Double-Block-Length Hash Function Using Feistel Structure. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Block Ciphers, Hash Function, Double Block Length Hash Function |
33 | Thomas Baignères, Matthieu Finiasz |
KFC - The Krazy Feistel Cipher. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Paul Onions |
On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Jacques Patarin |
About Feistel Schemes with Six (or More) Rounds. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Kaisa Nyberg |
Generalized Feistel Networks. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Ben Morris, Phillip Rogaway, Till Stegers |
How to Encipher Messages on a Small Domain. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Wenying Zhang, Jing Han |
Impossible Differential Analysis of Reduced Round CLEFIA. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA |
28 | Orr Dunkelman, Nathan Keller |
An Improved Impossible Differential Attack on MISTY1. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Dragos Trinca |
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption |
28 | Jacques Patarin |
On Linear Systems of Equations with Distinct Variables and Small Block Size. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Craig Gentry, Zulfikar Ramzan |
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram |
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Henri Gilbert, Marine Minier |
New Results on the Pseudorandomness of Some Blockcipher Constructions. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa |
Round Security and Super-Pseudorandomness of MISTY Type Structure. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Dan Boneh |
Simplified OAEP for the RSA and Rabin Functions. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ali Aydin Selçuk |
On Bias Estimation in Linear Cryptanalysis. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
28 | David Chaum |
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
22 | Bing Sun 0001, Longjiang Qu, Chao Li 0002 |
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
interpolation attack, integral attack, block cipher, Feistel cipher |
22 | Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo |
Impossible Differential Cryptanalysis of CLEFIA. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA |
22 | Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 |
Algebraic and Slide Attacks on KeeLoq. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks |
22 | Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata |
The 128-Bit Blockcipher CLEFIA (Extended Abstract). |
FSE |
2007 |
DBLP DOI BibTeX RDF |
generalized Feistel structure, DSM, blockcipher, CLEFIA |
18 | Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001 |
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks. |
Des. Codes Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri |
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers. |
Des. Codes Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yafei Wang, Lin Teng, Xingyuan Wang |
An image encryption algorithm based on circular rotation and generalized Feistel structure. |
Soft Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Dmitry Zakharov, M. Pudovkina |
Full round impossible differentials for Feistel ciphers. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Maya Chartouny, Benoit Cogliati, Jacques Patarin |
Classical and Quantum Generic Attacks on 6-round Feistel Schemes. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Patrick Derbez, Marie Euler |
Equivalence of Generalised Feistel Networks. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Lorenzo Grassi 0001, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert |
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Jian Zou, Kairong Huang, Min Zhu, Hongkai Zou, Yiyuan Luo, Qian Liu |
New Demiric-Selçuk meet-in-the-middle attacks on Misty and Feistel schemes. |
Quantum Inf. Process. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Derbez, Marie Euler |
Equivalence of Generalised Feistel Networks. |
IACR Trans. Symmetric Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lorenzo Grassi 0001, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert |
Generalized Feistel Ciphers for Efficient Prime Field Masking. |
EUROCRYPT (3) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Isma Norshahila Mohammad Shah, Eddie Shahril Ismail, Faieza Samat, Normahirah Nek Abd Rahman |
Modified Generalized Feistel Network Block Cipher for the Internet of Things. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jiajie Liu, Bing Sun 0001, Guoqiang Liu, Xinfeng Dong, Li Liu 0002, Hua Zhang 0008, Chao Li 0002 |
New Wine Old Bottles: Feistel Structure Revised. |
IEEE Trans. Inf. Theory |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wenjie Liu, Mengting Wang, Zixian Li |
Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuying Man, Sihem Mesnager, Nian Li, Xiangyong Zeng, Xiaohu Tang |
In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuqing Zhao, Chun Guo 0002, Weijia Wang 0003 |
Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme |
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang |
Automated Meet-in-the-Middle Attack Goes to Feistel. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 |
Quantum Attacks on Type-1 Generalized Feistel Schemes. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Yinsong Xu 0002, Zheng Yuan |
Quantum meet-in-the-middle attack on Feistel construction. |
Quantum Inf. Process. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 433 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|