Results 11 to 20 of about 6,728,968 (223)
Round Addition Using Faults for Generalized Feistel Network
SUMMARY This article presents a di ff erential fault analysis (DFA) technique using round addition for a generalized Feistel network (GFN) including CLEFIA and RC6.
H. Yoshikawa, M. Kaminaga, A. Shikoda
semanticscholar +5 more sources
Modified Generalized Feistel Network Block Cipher for the Internet of Things
With the advent of the Internet-of-Things (IoT) technologies, millions of low-resource devices are constantly used at the network’s edge. As a result, the large amount of private and sensitive data generated by these devices must be securely transported,
Isma Norshahila Mohammad Shah +3 more
semanticscholar +3 more sources
The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees.
ONGLe D, UJiao D, UWen-ling W
doaj +3 more sources
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI +3 more
doaj +3 more sources
Finding the optimal linear approximation of Feistel network
Summary: An approach to finding the linear approximation of Feistel network is presented. The mathematical formulation of the linear approximation problem and an algorithm for finding the optimal linear approximation of the generalized Feistel network are described.
G. Shushuev
semanticscholar +3 more sources
This paper proposes a novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks (DCGANs), quaternions, an improved Feistel network, and an overall scrambling and diffusion mechanism.
Pengfei Fang, Han Liu, Chengmao Wu
doaj +1 more source
End-to-End Encryption in Resource-Constrained IoT Device
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj +1 more source
Multiset Structural Attack on Generalized Feistel Networks [PDF]
In this paper, we present new generic multiset attacks against generalized Feistel networks, by which we can recover all the unknown round functions completely instead of deciding whether an unknown encryption oracle is such network or a random permutation.
Ruya Fan +4 more
openaire +1 more source
The article revealed the research of methods for constructing block ciphers and its advantages and disadvantages. The modified algorithm based on the Feistel network using Hamming codes and adding an element of randomness into the encryption key was ...
Pavel Chernov, Aleksander Shkaraputa
semanticscholar +1 more source
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj +1 more source

