Results 11 to 20 of about 6,728,968 (223)

Round Addition Using Faults for Generalized Feistel Network

open access: yesIEICE Transactions on Information and Systems, 2013
SUMMARY This article presents a di ff erential fault analysis (DFA) technique using round addition for a generalized Feistel network (GFN) including CLEFIA and RC6.
H. Yoshikawa, M. Kaminaga, A. Shikoda
semanticscholar   +5 more sources

Modified Generalized Feistel Network Block Cipher for the Internet of Things

open access: yesSymmetry, 2023
With the advent of the Internet-of-Things (IoT) technologies, millions of low-resource devices are constantly used at the network’s edge. As a result, the large amount of private and sensitive data generated by these devices must be securely transported,
Isma Norshahila Mohammad Shah   +3 more
semanticscholar   +3 more sources

Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network

open access: yesTongxin xuebao, 2014
The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees.
ONGLe D, UJiao D, UWen-ling W
doaj   +3 more sources

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +3 more sources

Finding the optimal linear approximation of Feistel network

open access: yesPrikladnaya diskretnaya matematika, 2014
Summary: An approach to finding the linear approximation of Feistel network is presented. The mathematical formulation of the linear approximation problem and an algorithm for finding the optimal linear approximation of the generalized Feistel network are described.
G. Shushuev
semanticscholar   +3 more sources

A Novel Chaotic Block Image Encryption Algorithm Based on Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2021
This paper proposes a novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks (DCGANs), quaternions, an improved Feistel network, and an overall scrambling and diffusion mechanism.
Pengfei Fang, Han Liu, Chengmao Wu
doaj   +1 more source

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Multiset Structural Attack on Generalized Feistel Networks [PDF]

open access: yesMathematical Problems in Engineering, 2019
In this paper, we present new generic multiset attacks against generalized Feistel networks, by which we can recover all the unknown round functions completely instead of deciding whether an unknown encryption oracle is such network or a random permutation.
Ruya Fan   +4 more
openaire   +1 more source

Modification of the algorithm based on the Feistel network by adding an element of randomness into the encryption key

open access: yesВестник Пермского университета. Математика. Механика. Информатика, 2021
The article revealed the research of methods for constructing block ciphers and its advantages and disadvantages. The modified algorithm based on the Feistel network using Hamming codes and adding an element of randomness into the encryption key was ...
Pavel Chernov, Aleksander Shkaraputa
semanticscholar   +1 more source

Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj   +1 more source

Home - About - Disclaimer - Privacy