Results 101 to 110 of about 6,728,968 (223)

Computer-Aided Proof for Extended Generalized Feistel Networks

open access: yesIACR Transactions on Symmetric Cryptology
(Multi-branch) Generalized Feistel Network (GFN) enables the construction of block ciphers from non-linear components with small domains, and has been adopted in various block ciphers. Berger et al. (SAC 2013) introduced the Extended Generalized Feistel
Yuchao Chen   +6 more
doaj   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

open access: yesIACR Transactions on Symmetric Cryptology, 2017
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differential characteristics: probability with independent S-box
Anne Canteaut   +5 more
doaj   +1 more source

Каскадна схема фейстеля та її стійкість до диференціального та лінійного криптоаналізу [PDF]

open access: yes, 2009
Запропоновано та проаналізовано нову конструкцію блочних шифрів – каскадну схему Фейстеля, виведені оцінки її стійкості до диференціального та лінійного криптоаналізу.New construction of block ciphers’ design, a cascade Feistel network, is proposed and ...
Яковлєв, Сергій Володимирович
core  

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure [PDF]

open access: yes, 2010
This paper reevaluates the security of GF-NLFSR, a new kind of generalized unbalanced Feistel network structure that was proposed at ACISP 2009. We show that GF-NLFSR itself reveals a very slow diffusion rate, which could lead to several distinguishing attacks.
Ruilin Li   +3 more
openaire   +1 more source

Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email [PDF]

open access: yes, 2010
The needs of information currently encourage the growth of information security methods. Art encryption and security is the cryptographic message is growing very fast right now.
Fathoni, Kholid   +2 more
core  

Decorrelation: A Theory for Block Cipher Security [PDF]

open access: yes, 2018
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core  

Quasigroups generated by shift registers and Feistel networks

open access: yesQuasigroups and Related Systems
Formula-based specification of large quasigroups with the use of complete mappings over Abelian groups is investigated. Complete mappings specified by generalized feedback registers and generalized Feistel networks are considered. In both cases criteria for the mapping completeness are established.
Chakrabarti, S.   +4 more
openaire   +3 more sources

THE AVALANCHE EFFECT IN ENCRYPTION ALGORITHMS BASED ON THE DISCRETE CHAOTIC MAPS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The avalance effect has been investigated in an encryption algorithm being developed on the basis of the discrete chaotic maps. The avalanche effect has been analyzed in a discrete tent map and in the basic transformation based on the Feistel network ...
K. S. Mulyarchik
doaj  

Home - About - Disclaimer - Privacy