Results 11 to 20 of about 3,394 (194)

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Photonics Journal, 2018
Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure.
Xuncai Zhang, Zheng Zhou, Ying Niu
doaj   +3 more sources

AKF: A key alternating Feistel scheme for lightweight cipher designs

open access: yesInformation Processing Letters, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Karakoc, F.   +2 more
openaire   +4 more sources

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Multidimensional Linear Cryptanalysis of Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only. This feature leads to a specific vulnerability that can be exploited using multidimensional linear cryptanalysis.
Ozdemir, Betuel Askin   +2 more
openaire   +6 more sources

A New Cipher Based on Feistel Structure and Chaotic Maps

open access: yesمجلة بغداد للعلوم, 2019
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed ...
Al-Bahrani et al.
doaj   +1 more source

Best Effort and Practice Activation Codes [PDF]

open access: yes, 2010
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.   +4 more
core   +4 more sources

Practically secure Feistel ciphers [PDF]

open access: yesDAIMI Report Series, 1994
In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers. We introducee a new concept, <strong> practical security</strong> against linear and differential attacks on Feistel ciphers. We give examples of such Feistel ciphers (practically) resistant to differential attacks, linear attacks and ...
openaire   +2 more sources

A new quantum cryptanalysis method on block cipher Camellia

open access: yesIET Information Security, 2021
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj   +1 more source

Weak Tweak-Keys for the CRAFT Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj   +1 more source

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy