Results 191 to 200 of about 6,661,504 (214)
Some of the next articles are maybe not open access.

Generalized Feistel networks

1996
A simple network of small s-boxes can be proven secure against differential and linear cryptanalysis. Upperbounds of the differential probabilities and the linear correlations are derived for a generalized Feistel network having 1, 2, 3 or 4 s-boxes in parallel per round. It is conjectured that the results hold in general.
openaire   +1 more source

Improved Attacks on Extended Generalized Feistel Networks

2016
In SAC 2013, Berger et al. defined Extended Generalized Feistel Networks (EGFN) and analyzed their security. They proposed designs with 8 or 16 branches. This class of schemes is well-suited for cryptographic applications. Using the minimal number of active S-boxes, the authors showed that for 64-bits messages divided into 8 branches, at least seven ...
Valérie Nachef   +2 more
openaire   +1 more source

A Hybrid Lightweight Cryptographic Scheme For Securing Node Data Based On The Feistel Cipher And MD5 Hash Algorithm In A Local IoT Network

2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), 2019
A cryptographic-based encryption algorithm that has low memory and minimal output space requirements as well as involving reduced computational overheads without compromising the strength and security of the encryption is desired for constrained devices ...
B. Asare   +2 more
semanticscholar   +1 more source

Double SP-Functions: Enhanced Generalized Feistel Networks

2011
This work deals with the security and efficiency of type-I and type-II generalized Feistel networks (GFNs) with 4 lines. We propose to instantiate the GFNs with double SP-functions (substitutionpermutation layer followed by another substitution-permutation layer) instead of single SP-functions (one substitution-permutation layer).
Andrey Bogdanov, Kyoji Shibutani
openaire   +1 more source

Linear provable security for a class of unbalanced feistel network

Applied Mathematics-A Journal of Chinese Universities, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Nianping   +2 more
openaire   +2 more sources

Provable Related-Key Security of Contracting Feistel Networks

2021
We continue the line of works constructing related-key secure PRFs (Bellare and Cash, CRYPTO 2010) and PRPs (Barbosa and Farshim, FSE 2014). In detail, we consider generalized Feistel networks using contracting round functions from \(\{0,1\}^m\) to \(\{0,1\}^n\), and explore conditions that are sufficient for such Contracting Feistel Networks (CFNs) to
Wenqi Yu, Yuqing Zhao, Chun Guo
openaire   +1 more source

Utilizing LFSR and Feistel networks in image encryption

2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013
This paper presents a new encryption scheme based on the combination between Linear Feedback Shift Register (LFSR) and generalized Feistel networks (GFN). The construction of each GFN depends on Substitution Boxes (S-Boxes) and its operation requires a key. The encryption key length is dynamic and can be controlled via the initial values of the LFSR, S-
Sherif H. AbdElHaleem   +2 more
openaire   +1 more source

Generic Attacks on Feistel Networks with Internal Permutations

2009
In this paper, we describe generic attacks on Feistel networks with internal permutations, instead of Feistel networks with internal functions as designed originally. By generic attacks, we mean that in these attacks the internal permutations are supposed to be random.
Joana Treger, Jacques Patarin
openaire   +1 more source

Improved Feistel-based ciphers for wireless sensor network security

Journal of Zhejiang University-SCIENCE A, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pazynyuk, Tamara   +2 more
openaire   +1 more source

On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability

Post-Quantum Cryptography, 2020
S. Hodžić, L. Knudsen, A. B. Kidmose
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy