Results 201 to 210 of about 6,661,504 (214)
Some of the next articles are maybe not open access.
Upper Bounds for the Security of Several Feistel Networks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013In this paper, we are dealing with upper bounds for the security of some Feistel networks. Such a topic has been discussed since the introduction of Luby-Rackoff construction, but it is unrealistic construction because its round functions must be chosen at random from the set of all functions.
openaire +1 more source
Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion
Multimedia tools and applications, 2022Jinqing Li, Jia Wang, Xiaoqiang Di
semanticscholar +1 more source
On Integral Distinguishers for Ciphers Based on the Feistel Network Generalizations
, 2020M. Sorokin, M. Pudovkina
semanticscholar +1 more source
International Conference on Application and Theory of Automation in Command and Control Systems, 2014
Quist-Aphetsi Kester +5 more
semanticscholar +1 more source
Quist-Aphetsi Kester +5 more
semanticscholar +1 more source
Upper bounds of differential characteristic probability for unbalanced Feistel network employing DSM
Wuhan University Journal of Natural Sciences, 2014Jiansheng Guo, Xiaoliang Hu, Wei Luo
semanticscholar +1 more source
A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security
, 2015A. Miyaji, M. Rashed
semanticscholar +1 more source
Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011R. Oliynykov +3 more
semanticscholar +1 more source
Cryptographic strength of a new symmetric block cipher based on Feistel network
, 2013A. Lagun
semanticscholar +1 more source

