Results 171 to 180 of about 6,728,968 (223)
Some of the next articles are maybe not open access.

Digital Data Protection Using Feistel Network and DNA Cryptography

2024 International Conference on Advanced Aspects of Software Engineering (ICAASE)
The growing importance of digital data security has led to increased exploration of advanced cryptographic methods, including innovative bio-inspired techniques such as DNA cryptography.
Aya Goudjil   +4 more
semanticscholar   +2 more sources

The Cryptographic Properties of Feistel Network-Based Quasigroups

Advances in Intelligent Systems and Computing, 2018
Quasigroups defined by Feistel network are used in the designing of several cryptographic primitives, where Feistel network is created by a bijection map from \(\mathbb {F}_2^n\) to \(\mathbb {F}_2^n \). It is known that quasigroups are represented as vectorial Boolean functions and these functions with high nonlinearity and low differential uniformity
Tajender Kumar, S. Gangopadhyay
semanticscholar   +2 more sources

Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure

Cryptography and Communications, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
J. Choy   +3 more
semanticscholar   +3 more sources

AquaMZ: New Lightweight Authenticated Encryption with Generalized Feistel Network Based Primitive for IoT Protocols

International Conference on Computer Science and Artificial Intelligence, 2022
This paper displays AquaMZ, an authenticated encryption with associated data (AEAD) algorithm for IoT protocols. It mainly focusing on the new cross field of IoT and symmetric cryptography and we optimized the algorithm by the lightweight idea.
Chen-Wei Huang
semanticscholar   +1 more source

A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces

Conference on Privacy, Security and Trust, 2022
Network traces represent a critical piece of data for network security. Due to lack of expertise, companies are forced to outsource their network traces to third parties to perform analytics on the traces and provide security feedback and recommendations.
Shaveta Dandyan   +2 more
semanticscholar   +1 more source

Generalized Feistel networks revisited

Designs, Codes and Cryptography, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bogdanov, Andrey, Shibutani, Kyoji
openaire   +2 more sources

Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation

Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011
R. Oliynykov   +3 more
semanticscholar   +3 more sources

Hierarchical Bit-Level Image Encryption Based on Chaotic Map and Feistel Network

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2019
In this paper, to avoid chosen-plaintext attacks and to enhance the security, SHA-256 hash value of the plain image is introduced to produce the initial values and parameters of the chaotic system, thus the produced keys and the ciphered image are highly
X. Liu, Yurong Song, Guoping Jiang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy