Results 171 to 180 of about 6,728,968 (223)
Some of the next articles are maybe not open access.
Digital Data Protection Using Feistel Network and DNA Cryptography
2024 International Conference on Advanced Aspects of Software Engineering (ICAASE)The growing importance of digital data security has led to increased exploration of advanced cryptographic methods, including innovative bio-inspired techniques such as DNA cryptography.
Aya Goudjil +4 more
semanticscholar +2 more sources
The Cryptographic Properties of Feistel Network-Based Quasigroups
Advances in Intelligent Systems and Computing, 2018Quasigroups defined by Feistel network are used in the designing of several cryptographic primitives, where Feistel network is created by a bijection map from \(\mathbb {F}_2^n\) to \(\mathbb {F}_2^n \). It is known that quasigroups are represented as vectorial Boolean functions and these functions with high nonlinearity and low differential uniformity
Tajender Kumar, S. Gangopadhyay
semanticscholar +2 more sources
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure
Cryptography and Communications, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
J. Choy +3 more
semanticscholar +3 more sources
Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion
Multimedia Tools and Applications, 2022Jinqing Li, Jia Wang, Xiaoqiang Di
semanticscholar +3 more sources
International Conference on Computer Science and Artificial Intelligence, 2022
This paper displays AquaMZ, an authenticated encryption with associated data (AEAD) algorithm for IoT protocols. It mainly focusing on the new cross field of IoT and symmetric cryptography and we optimized the algorithm by the lightweight idea.
Chen-Wei Huang
semanticscholar +1 more source
This paper displays AquaMZ, an authenticated encryption with associated data (AEAD) algorithm for IoT protocols. It mainly focusing on the new cross field of IoT and symmetric cryptography and we optimized the algorithm by the lightweight idea.
Chen-Wei Huang
semanticscholar +1 more source
A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces
Conference on Privacy, Security and Trust, 2022Network traces represent a critical piece of data for network security. Due to lack of expertise, companies are forced to outsource their network traces to third parties to perform analytics on the traces and provide security feedback and recommendations.
Shaveta Dandyan +2 more
semanticscholar +1 more source
Generalized Feistel networks revisited
Designs, Codes and Cryptography, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bogdanov, Andrey, Shibutani, Kyoji
openaire +2 more sources
Upper bounds of differential characteristic probability for unbalanced Feistel network employing DSM
Wuhan University Journal of Natural Sciences, 2014Jiansheng Guo, Xiaoliang Hu, Wei Luo
semanticscholar +3 more sources
Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011R. Oliynykov +3 more
semanticscholar +3 more sources
Hierarchical Bit-Level Image Encryption Based on Chaotic Map and Feistel Network
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2019In this paper, to avoid chosen-plaintext attacks and to enhance the security, SHA-256 hash value of the plain image is introduced to produce the initial values and parameters of the chaotic system, thus the produced keys and the ciphered image are highly
X. Liu, Yurong Song, Guoping Jiang
semanticscholar +1 more source

