Results 181 to 190 of about 6,661,504 (214)
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure [PDF]
This paper reevaluates the security of GF-NLFSR, a new kind of generalized unbalanced Feistel network structure that was proposed at ACISP 2009. We show that GF-NLFSR itself reveals a very slow diffusion rate, which could lead to several distinguishing attacks.
Ruilin Li, Bing Sun, C. Li, Longjiang Qu
semanticscholar +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Built on Feistel Network Architecture Block Ciphers Modification
Automation, Control, and Information TechnologyThe article considers the method of implementing Shannon’s idea of building a cryptographically stable system by repeatedly applying relatively simple cryptographic transformations. At the same time was being solved the problem of simultaneously reducing
Serhii Naumenko +2 more
semanticscholar +1 more source
Quantum Round Key Recovery Attack on Extended Generalized Feistel Network
2024 IEEE 5th International Conference on Advanced Trends in Information Theory (ATIT)In this paper, we analyse the extended generalized Feistel-like scheme and construct new quantum distinguishing attacks as well as multiple new quantum round key recovery attacks on this scheme with polynomial complexity. The obtained result implies that
Bohdan Dyhas, Andrii Fesenko
semanticscholar +1 more source
Analysis of Security for a New Kind of an Extended Generalized Feistel Network
Proceedings of the 2024 3rd International Conference on Algorithms, Data Mining, and Information TechnologyDifferential cryptanalysis and linear cryptanalysis are two classic analytical methods for block ciphers, and they are of great significance for evaluating the security of block ciphers.
Xinfeng Dong +4 more
semanticscholar +1 more source
Beyond-birthday security for permutation-based Feistel networks
Designs, Codes and Cryptography, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chun Guo, Guoyan Zhang
openaire +2 more sources
Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Frontiers of Information Technology & Electronic Engineering, 2018As promising alternatives in building future main memory systems, emerging non-volatile memory (NVM) technologies can increase memory capacity in a cost-effective and power-efficient way.
Fangting Huang +7 more
semanticscholar +1 more source
Indifferentiability of 8-Round Feistel Networks
2016We prove that a balanced 8-round Feistel network is indifferentiable from a random permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al. Our simulator achieves security $$Oq^8/2^n$$, similarly to the security of Dai et al. For further comparison, Dachman-Soled et al.
Yuanxi Dai, John Steinberger
openaire +1 more source
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure
Cryptography and Communications, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
J. Choy +3 more
semanticscholar +3 more sources
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption
Journal of Discrete Mathematical Sciences and CryptographyThe emergence of the Internet of Things (IoT) has initiated an era where numerous devices are interconnected, resulting in the generation of significant volumes of data.
Kiran Deep Singh +4 more
semanticscholar +1 more source

