Results 181 to 190 of about 6,728,968 (223)
Some of the next articles are maybe not open access.

Hybrid Encryption Algorithm Based on Feistel Network and Vigenère Cipher

2025 Eight International Conference on Vocational Education and Electrical Engineering (ICVEE)
This paper introduces a hybrid encryption algorithm that addresses the predictable key patterns, limited character support, and low diffusion inherent in the classical Vigenère cipher.
Estelito Jr. Rodrigo Medallada   +1 more
semanticscholar   +1 more source

The Built on Feistel Network Architecture Block Ciphers Modification

Automation, Control, and Information Technology
The article considers the method of implementing Shannon’s idea of building a cryptographically stable system by repeatedly applying relatively simple cryptographic transformations. At the same time was being solved the problem of simultaneously reducing
Serhii Naumenko   +2 more
semanticscholar   +1 more source

Analysis of Security for a New Kind of an Extended Generalized Feistel Network

Proceedings of the 2024 3rd International Conference on Algorithms, Data Mining, and Information Technology
Differential cryptanalysis and linear cryptanalysis are two classic analytical methods for block ciphers, and they are of great significance for evaluating the security of block ciphers.
Xinfeng Dong   +4 more
semanticscholar   +1 more source

Quantum Round Key Recovery Attack on Extended Generalized Feistel Network

2024 IEEE 5th International Conference on Advanced Trends in Information Theory (ATIT)
In this paper, we analyse the extended generalized Feistel-like scheme and construct new quantum distinguishing attacks as well as multiple new quantum round key recovery attacks on this scheme with polynomial complexity. The obtained result implies that
Bohdan Dyhas, Andrii Fesenko
semanticscholar   +1 more source

Beyond-birthday security for permutation-based Feistel networks

Designs, Codes and Cryptography, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chun Guo, Guoyan Zhang
openaire   +2 more sources

Enhancing security of NVM-based main memory with dynamic Feistel network mapping

Frontiers of Information Technology & Electronic Engineering, 2018
As promising alternatives in building future main memory systems, emerging non-volatile memory (NVM) technologies can increase memory capacity in a cost-effective and power-efficient way.
Fangting Huang   +7 more
semanticscholar   +1 more source

Indifferentiability of 8-Round Feistel Networks

2016
We prove that a balanced 8-round Feistel network is indifferentiable from a random permutation, improving on previous 10-round results by Dachman-Soled et al. and Dai et al. Our simulator achieves security $$Oq^8/2^n$$, similarly to the security of Dai et al. For further comparison, Dachman-Soled et al.
Yuanxi Dai, John Steinberger
openaire   +1 more source

On unbalanced Feistel networks with contracting MDS diffusion

Designs, Codes and Cryptography, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Generalized Feistel networks

1996
A simple network of small s-boxes can be proven secure against differential and linear cryptanalysis. Upperbounds of the differential probabilities and the linear correlations are derived for a generalized Feistel network having 1, 2, 3 or 4 s-boxes in parallel per round. It is conjectured that the results hold in general.
openaire   +1 more source

Cryptographic security for IoT : Leveraging Feistel-permutation network for enhanced encryption

Journal of Discrete Mathematical Sciences and Cryptography
The emergence of the Internet of Things (IoT) has initiated an era where numerous devices are interconnected, resulting in the generation of significant volumes of data.
Kiran Deep Singh   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy