Results 91 to 100 of about 164 (126)
Some of the next articles are maybe not open access.

Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers

2019
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen-ciphertext attacks (CCAs). However, the security significantly changes when we consider attacks in the quantum setting, where the adversary can make superposition queries.
Ito, Gembu   +4 more
openaire   +3 more sources

A chaos-based block cipher with Feistel structure

2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, 2014
In this paper, based on chaotic systems and balanced Feistel network structure, a symmetric block cipher with 256-bit secret key is proposed. The cipher operates on 64-bit plaintext blocks through 16 rounds computing. Within the kernel component of the cipher, i.e., round function F, a hyperchaotic system with four-wing attractors is used to improve ...
Jun Peng, Liang Lei, Qi Han, Rong Jia
openaire   +1 more source

Feistel Ciphers Based on a Single Primitive

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2023
Kento TSUJI, Tetsu IWATA
openaire   +1 more source

The Security of Feistel Ciphers with Six Rounds or Less

Journal of Cryptology, 2002
\textit{M. Luby} and \textit{C. Rackoff} [SIAM J. Comput. 17, 373-386 (1988; Zbl 0644.94018)] showed a method for constructing pseudorandom permutations from pseudorandom functions by using three or four rounds of Feistel networks. The security of their construction as well as others suggested later is measured in terms of the complexity of ...
openaire   +2 more sources

Full round impossible differentials for Feistel ciphers

Journal of Computer Virology and Hacking Techniques, 2023
D. Zakharov, M. Pudovkina
openaire   +1 more source

Feistel Ciphers

2017
Valerie Nachef   +2 more
openaire   +1 more source

Cryptanalyzing an image cipher using multiple chaos and DNA operations

Journal of King Saud University - Computer and Information Sciences, 2023
Heping Wen
exaly  

A Proposed Non Feistel Block Cipher Algorithm

Qalaai Zanist Scientific Journal, 2017
Ahssan Ahmed Mohammed   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy