The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Feistel with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1997 (16) 1998-2001 (22) 2002-2003 (19) 2004 (15) 2005-2006 (17) 2007-2008 (28) 2009 (17) 2010 (19) 2011 (16) 2012-2013 (25) 2014 (18) 2015 (28) 2016 (21) 2017 (21) 2018 (21) 2019 (24) 2020 (22) 2021 (24) 2022 (30) 2023 (20) 2024 (10)
Publication types (Num. hits)
article(218) book(1) incollection(2) inproceedings(210) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 115 occurrences of 64 keywords

Results
Found 440 publication records. Showing 433 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
139Yevgeniy Dodis, Prashant Puniya Feistel Networks Made Public, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network
125Jacques Patarin Generic Attacks on Feistel Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations
111Taizo Shirai, Kyoji Shibutani Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF active S-boxes, multiple MDS design, MDS, Feistel cipher
89Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
83Taizo Shirai, Kyoji Shibutani On Feistel Structures Using a Diffusion Switching Mechanism. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feistel structure, optimal diffusion mappings, blockcipher
83Taizo Shirai, Bart Preneel On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF optimal diffusion mapping, active S-boxes, MDS, Feistel cipher
68Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher
68Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
68Charanjit S. Jutla Generalized Birthday Arracks on Unbalanced Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF second moment method, Block ciphers, birthday attacks, pseudo-random permutations, Feistel networks
61Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi SCARE of an Unknown Hardware Feistel Implementation. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61William Aiello, Ramarathnam Venkatesan Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
57Eli Biham Cryptanalysis of Ladder-DES. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
54Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers
54Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
54Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
50Paul Crowley Mercy: A Fast Large Block Cipher for Disk Sector Encryption. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher
47Gilles Piret Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
47Nicolas T. Courtois Feistel Schemes and Bi-linear Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Lars R. Knudsen The Security of Feistel Ciphers with Six Rounds or Less. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Masayuki Kanda Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
47Reihaneh Safavi-Naini Feistel Type Authentication Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
43Shuai Chen, XianXin Zhong, Zhengzhong Wu Chaos block cipher for wireless sensor network. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF discrete chaos, encryption function, single byte, wireless sensor network, block cipher
43Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin Luby-Rackoff Ciphers from Weak Round Functions? Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Ueli M. Maurer, Krzysztof Pietrzak The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Haining Chen, Yongbin Zhou, Wenling Wu, Na Wang Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Fault Propagation Pattern, Fault Propagation Path, Camellia, Feistel Cipher, Differential Fault Analysis
37Emmanuel Volte Miroirs, Cubes et Feistel Dissymétriques. (Mirrors, cubes and unbalanced Feistel schemes). Search on Bibsonomy 2014   RDF
37Aleksandra Mileva, Smile Markovski Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers. Search on Bibsonomy ICT Innovations The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
36G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha Performance Enhancement of CAST-128 Algorithm by modifying its function. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext
36Lars R. Knudsen, Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers
36Hua Chen 0011, Wenling Wu, Dengguo Feng Differential Fault Analysis on CLEFIA. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generalized Feistel Structure, Differential Fault Attack, Block Cipher
36Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network
36Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish Versatile padding schemes for joint signature and encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption
36Nicolas T. Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
36Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
35Rainer Feistel Self-Organisation of Prediction Models. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Olaf Hellmuth, Jürn W. P. Schmelzer, Rainer Feistel Ice-Crystal Nucleation in Water: Thermodynamic Driving Force and Surface Tension. Part I: Theoretical Foundation. Search on Bibsonomy Entropy The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Olaf Hellmuth, Rainer Feistel Analytical Determination of the Nucleation-Prone, Low-Density Fraction of Subcooled Water. Search on Bibsonomy Entropy The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Wenke Markgraf, Jannis Lilienthal, Philipp Feistel, Christine Thiele, Hagen Malberg Algorithm for Mapping Kidney Tissue Water Content during Normothermic Machine Perfusion Using Hyperspectral Imaging. Search on Bibsonomy Algorithms The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Tanja Auge, Erik Manthey, Susanne Jürgensmann, Susanne Feistel, Andreas Heuer 0001 Schema Evolution and Reproducibility of Long-term Hydrographic Data Sets at the IOW. Search on Bibsonomy LWDA The full citation details ... 2020 DBLP  BibTeX  RDF
35Rainer Feistel Distinguishing between Clausius, Boltzmann and Pauling Entropies of Frozen Non-Equilibrium States. Search on Bibsonomy Entropy The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
35Karin R. Feistel, Luiz A. C. Lopes Design procedure for the LPF of a three-phase SPWM VSC operating with a wide range of output power, voltage and frequency with low harmonic distortion. Search on Bibsonomy ICIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Ilvio Bruder, Meike Klettke, Mark Lukas Möller, Frank Meyer, Andreas Heuer 0001, Susanne Jürgensmann, Susanne Feistel Daten wie Sand am Meer - Datenerhebung, -strukturierung, -management und Data Provenance für die Ostseeforschung. Search on Bibsonomy Datenbank-Spektrum The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Mark Burgin, Rainer Feistel Structural and Symbolic Information in the Context of the General Theory of Information. Search on Bibsonomy Inf. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35G. Sivanagaraju, Suvendu Samanta, Luccas M. Kunzler, Karin R. Feistel, Akshay K. Rathore, Luiz A. Lopes PFC interleaved buck-boost converter for telecom power application. Search on Bibsonomy IECON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Rainer Feistel, Werner Ebeling Entropy and the Self-Organization of Information and Value. Search on Bibsonomy Entropy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
35Stoycho Stefanov, Angela Feistel, Slawomir Stanczak Two Stage Power Control in Multi-cell Wireless Networks. Search on Bibsonomy EW The full citation details ... 2011 DBLP  BibTeX  RDF
35Angela Feistel A Theoretical Framework for MAC-layer Design in Wireless Networks. Search on Bibsonomy 2011   RDF
35Angela Feistel, Slawomir Stanczak, Daniel Tomecki Joint Utility-Based Power Control and Receive Beamforming in Decentralized Wireless Networks. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Slawomir Stanczak, Angela Feistel, Marcin Wiczanowski, Holger Boche Utility-based power control with QoS support. Search on Bibsonomy Wirel. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Iordanis Koutsopoulos, Slawomir Stanczak, Angela Feistel Transmit Rate Control for Energy-Efficient Estimation in Wireless Sensor Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Slawomir Stanczak, Angela Feistel, Holger Boche QoS support with utility-based power control. Search on Bibsonomy ISIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Slawomir Stanczak, Angela Feistel, Holger Boche, Marcin Wiczanowski Towards efficient and fair resource allocation in wireless networks. Search on Bibsonomy WiOpt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Angela Feistel, Slawomir Stanczak Hop-by-Hop Congestion Control with Power Control for Wireless Mesh Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Slawomir Stanczak, Angela Feistel, Daniel Tomecki On Utility-Based Power Control and Receive Beamforming. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Angela Feistel, Slawomir Stanczak Dynamic resource allocation in wireless ad hoc networks based on QS-CDMA. Search on Bibsonomy PIMRC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35M. Feistel, A. Baier Performance of a three-dimensional propagation model in urban environments. Search on Bibsonomy PIMRC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
35Heinrich Niemann, Horst Bunke, Ingrid Hofmann, Gerhard Sagerer, Friedrich Wolf, Herbert Feistel A Knowledge Based System for Analysis of Gated Blood Pool Studies. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
35Horst Bunke, Herbert Feistel, Ingrid Hofmann, Heinrich Niemann, Gerhard Sagerer Ein wissensbasiertes System zur automatischen Auswertung von Bildsequenzen des menschlichen Herzens. Search on Bibsonomy DAGM-Symposium The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
33Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
33Thomas Baignères, Matthieu Finiasz KFC - The Krazy Feistel Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Paul Onions On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
33Jacques Patarin About Feistel Schemes with Six (or More) Rounds. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
33Kaisa Nyberg Generalized Feistel Networks. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Ben Morris, Phillip Rogaway, Till Stegers How to Encipher Messages on a Small Domain. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Wenying Zhang, Jing Han Impossible Differential Analysis of Reduced Round CLEFIA. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA
28Orr Dunkelman, Nathan Keller An Improved Impossible Differential Attack on MISTY1. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption
28Jacques Patarin On Linear Systems of Equations with Distinct Variables and Small Block Size. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Craig Gentry, Zulfikar Ramzan Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Henri Gilbert, Marine Minier New Results on the Pseudorandomness of Some Blockcipher Constructions. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa Round Security and Super-Pseudorandomness of MISTY Type Structure. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Dan Boneh Simplified OAEP for the RSA and Rabin Functions. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
22Bing Sun 0001, Longjiang Qu, Chao Li 0002 New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpolation attack, integral attack, block cipher, Feistel cipher
22Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo Impossible Differential Cryptanalysis of CLEFIA. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA
22Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 Algebraic and Slide Attacks on KeeLoq. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks
22Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata The 128-Bit Blockcipher CLEFIA (Extended Abstract). Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized Feistel structure, DSM, blockcipher, CLEFIA
18Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001 Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yafei Wang, Lin Teng, Xingyuan Wang An image encryption algorithm based on circular rotation and generalized Feistel structure. Search on Bibsonomy Soft Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Dmitry Zakharov, M. Pudovkina Full round impossible differentials for Feistel ciphers. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Maya Chartouny, Benoit Cogliati, Jacques Patarin Classical and Quantum Generic Attacks on 6-round Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Patrick Derbez, Marie Euler Equivalence of Generalised Feistel Networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Lorenzo Grassi 0001, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Jian Zou, Kairong Huang, Min Zhu, Hongkai Zou, Yiyuan Luo, Qian Liu New Demiric-Selçuk meet-in-the-middle attacks on Misty and Feistel schemes. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Patrick Derbez, Marie Euler Equivalence of Generalised Feistel Networks. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Lorenzo Grassi 0001, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert Generalized Feistel Ciphers for Efficient Prime Field Masking. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Isma Norshahila Mohammad Shah, Eddie Shahril Ismail, Faieza Samat, Normahirah Nek Abd Rahman Modified Generalized Feistel Network Block Cipher for the Internet of Things. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jiajie Liu, Bing Sun 0001, Guoqiang Liu, Xinfeng Dong, Li Liu 0002, Hua Zhang 0008, Chao Li 0002 New Wine Old Bottles: Feistel Structure Revised. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Wenjie Liu, Mengting Wang, Zixian Li Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuying Man, Sihem Mesnager, Nian Li, Xiangyong Zeng, Xiaohu Tang In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuqing Zhao, Chun Guo 0002, Weijia Wang 0003 Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang Automated Meet-in-the-Middle Attack Goes to Feistel. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 Quantum Attacks on Type-1 Generalized Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Yinsong Xu 0002, Zheng Yuan Quantum meet-in-the-middle attack on Feistel construction. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 433 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license