Results 171 to 180 of about 6,661,504 (214)
Some of the next articles are maybe not open access.
Information Processing Letters, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu Sasaki, Yosuke Todo
semanticscholar +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yu Sasaki, Yosuke Todo
semanticscholar +3 more sources
International Conference on Computer Science and Artificial Intelligence, 2022
This paper displays AquaMZ, an authenticated encryption with associated data (AEAD) algorithm for IoT protocols. It mainly focusing on the new cross field of IoT and symmetric cryptography and we optimized the algorithm by the lightweight idea.
Chen-Wei Huang
semanticscholar +1 more source
This paper displays AquaMZ, an authenticated encryption with associated data (AEAD) algorithm for IoT protocols. It mainly focusing on the new cross field of IoT and symmetric cryptography and we optimized the algorithm by the lightweight idea.
Chen-Wei Huang
semanticscholar +1 more source
A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces
Conference on Privacy, Security and Trust, 2022Network traces represent a critical piece of data for network security. Due to lack of expertise, companies are forced to outsource their network traces to third parties to perform analytics on the traces and provide security feedback and recommendations.
Shaveta Dandyan +2 more
semanticscholar +1 more source
A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)
, 2012In this paper a new Symmetric Key Cryptosystem, based on Feistel Networks has been proposed. The Cryptosystem demonstrates a few effective features like variable size key, variable size plain text encryption depending on data and key, padding by random variables etc. The cryptosystem is designed to be efficient on processors using simple operations.
I. Das, R. Saravanan
semanticscholar +2 more sources
Lightweight Recursive MDS Matrices with Generalized Feistel Network
International Workshop on Security, 2018Maximum distance separable (MDS) matrices are often used to construct optimal linear diffusion layers in many block ciphers. With the development of lightweight cryptography, the recursive MDS matrices play as good candidates. The recursive MDS matrices can be computed as powers of sparse matrices.
Qiuping Li, Baofeng Wu, Zhuojun Liu
semanticscholar +2 more sources
Generalized Feistel networks revisited
Designs, Codes and Cryptography, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bogdanov, Andrey, Shibutani, Kyoji
openaire +2 more sources
Finding the optimal linear approximation of Feistel network
Summary: An approach to finding the linear approximation of Feistel network is presented. The mathematical formulation of the linear approximation problem and an algorithm for finding the optimal linear approximation of the generalized Feistel network are described.
G. Shushuev
semanticscholar +3 more sources
The Cryptographic Properties of Feistel Network-Based Quasigroups
Advances in Intelligent Systems and Computing, 2018Quasigroups defined by Feistel network are used in the designing of several cryptographic primitives, where Feistel network is created by a bijection map from \(\mathbb {F}_2^n\) to \(\mathbb {F}_2^n \). It is known that quasigroups are represented as vectorial Boolean functions and these functions with high nonlinearity and low differential uniformity
Tajender Kumar, S. Gangopadhyay
semanticscholar +2 more sources
Hierarchical Bit-Level Image Encryption Based on Chaotic Map and Feistel Network
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2019In this paper, to avoid chosen-plaintext attacks and to enhance the security, SHA-256 hash value of the plain image is introduced to produce the initial values and parameters of the chaotic system, thus the produced keys and the ciphered image are highly
X. Liu, Yurong Song, Guoping Jiang
semanticscholar +1 more source
Hybrid Encryption Algorithm Based on Feistel Network and Vigenère Cipher
2025 Eight International Conference on Vocational Education and Electrical Engineering (ICVEE)This paper introduces a hybrid encryption algorithm that addresses the predictable key patterns, limited character support, and low diffusion inherent in the classical Vigenère cipher.
Estelito Jr. Rodrigo Medallada +1 more
semanticscholar +1 more source

