Results 181 to 190 of about 6,661,504 (214)

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure [PDF]

open access: yesAustralasian Conference on Information Security and Privacy, 2010
This paper reevaluates the security of GF-NLFSR, a new kind of generalized unbalanced Feistel network structure that was proposed at ACISP 2009. We show that GF-NLFSR itself reveals a very slow diffusion rate, which could lead to several distinguishing attacks.
Ruilin Li, Bing Sun, C. Li, Longjiang Qu
semanticscholar   +2 more sources

The Built on Feistel Network Architecture Block Ciphers Modification

Automation, Control, and Information Technology
The article considers the method of implementing Shannon’s idea of building a cryptographically stable system by repeatedly applying relatively simple cryptographic transformations. At the same time was being solved the problem of simultaneously reducing
Serhii Naumenko   +2 more
semanticscholar   +1 more source

Quantum Round Key Recovery Attack on Extended Generalized Feistel Network

2024 IEEE 5th International Conference on Advanced Trends in Information Theory (ATIT)
In this paper, we analyse the extended generalized Feistel-like scheme and construct new quantum distinguishing attacks as well as multiple new quantum round key recovery attacks on this scheme with polynomial complexity. The obtained result implies that
Bohdan Dyhas, Andrii Fesenko
semanticscholar   +1 more source

Analysis of Security for a New Kind of an Extended Generalized Feistel Network

Proceedings of the 2024 3rd International Conference on Algorithms, Data Mining, and Information Technology
Differential cryptanalysis and linear cryptanalysis are two classic analytical methods for block ciphers, and they are of great significance for evaluating the security of block ciphers.
Xinfeng Dong   +4 more
semanticscholar   +1 more source

Beyond-birthday security for permutation-based Feistel networks

Designs, Codes and Cryptography, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chun Guo, Guoyan Zhang
openaire   +2 more sources

Enhancing security of NVM-based main memory with dynamic Feistel network mapping

Frontiers of Information Technology & Electronic Engineering, 2018
As promising alternatives in building future main memory systems, emerging non-volatile memory (NVM) technologies can increase memory capacity in a cost-effective and power-efficient way.
Fangting Huang   +7 more
semanticscholar   +1 more source

Indifferentiability of 8-Round Feistel Networks

2016
We prove that a balanced 8-round Feistel network is indifferentiable from a random permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al. Our simulator achieves security $$Oq^8/2^n$$, similarly to the security of Dai et al. For further comparison, Dachman-Soled et al.
Yuanxi Dai, John Steinberger
openaire   +1 more source

Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure

Cryptography and Communications, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
J. Choy   +3 more
semanticscholar   +3 more sources

On unbalanced Feistel networks with contracting MDS diffusion

Designs, Codes and Cryptography, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption

Journal of Discrete Mathematical Sciences and Cryptography
The emergence of the Internet of Things (IoT) has initiated an era where numerous devices are interconnected, resulting in the generation of significant volumes of data.
Kiran Deep Singh   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy