Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Tsonka Baicheva, Svetlana Topalova |
On the Diffusion Property of the Improved Generalized Feistel with Different Permutations for Each Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAI ![In: Algebraic Informatics - 8th International Conference, CAI 2019, Niš, Serbia, June 30 - July 4, 2019, Proceedings, pp. 38-49, 2019, Springer, 978-3-030-21362-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001 |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 129-145, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata |
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, pp. 433-455, 2019, Springer, 978-3-030-35422-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata |
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings, pp. 391-411, 2019, Springer, 978-3-030-12611-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Martin R. Albrecht, Lorenzo Grassi 0001, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy 0005, Markus Schofnegger |
Feistel Structures for MPC, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, pp. 151-171, 2019, Springer, 978-3-030-29961-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
18 | Nicolas T. Courtois, Jörg Drobick, Klaus Schmeh |
Feistel ciphers in East Germany in the communist era. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 42(5), pp. 427-444, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Fangting Huang, Dan Feng 0001, Wen Xia, Wen Zhou, Yucheng Zhang, Min Fu 0002, Chuntao Jiang, Yukun Zhou |
Enhancing security of NVM-based main memory with dynamic Feistel network mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 19(7), pp. 847-863, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Valérie Nachef, Jacques Patarin, Emmanuel Volte |
Generic attacks with standard deviation analysis on a-feistel schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 10(1), pp. 59-77, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyang Dong, Xiaoyun Wang 0001 |
Quantum key-recovery attack on Feistel structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 61(10), pp. 102501:1-102501:7, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Tahar Mekhaznia 0001, Abdelmadjid Zidani |
Swarm intelligence algorithms in cryptanalysis of simple Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 13(1), pp. 114-138, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Chun Guo 0002 |
Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1810.07428, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Jan Wassenberg, Robert Obryk, Jyrki Alakuijala, Emmanuel Mogenet |
Randen - fast backtracking-resistant random generator with AES+Feistel+Reverie. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1810.02227, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Chun Guo 0002, Lei Wang 0031 |
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 816, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Mahdi Sajadieh, Mohammad Vaziri |
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 739, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Mahdi Sajadieh, Mohsen Mousavi |
Construction of Lightweight MDS Matrices from Generalized Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1072, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | F. Betül Durak, Serge Vaudenay |
Generic Round-Function Recovery for Feistel Networks over Small Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 108, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang 0001 |
Quantum Attacks on Some Feistel Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 504, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata |
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1193, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Wafaa S. Sayed, Mohammed F. Tolba 0002, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz, Ahmed M. Soliman |
Security and Efficiency of Feistel Networks Versus Discrete Chaos for Lightweight Speech Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICM ![In: 30th International Conference on Microelectronics, ICM 2018, Sousse, Tunisia, December 16-19, 2018, pp. 92-95, 2018, IEEE, 978-1-5386-8167-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | F. Betül Durak, Serge Vaudenay |
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, pp. 440-458, 2018, Springer, 978-3-319-93386-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Chun Guo 0002, Lei Wang 0031 |
Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I, pp. 213-243, 2018, Springer, 978-3-030-03325-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Qiuping Li, Baofeng Wu, Zhuojun Liu |
Lightweight Recursive MDS Matrices with Generalized Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 262-278, 2018, Springer, 978-3-319-97915-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Mahdi Sajadieh, Mohammad Vaziri |
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings, pp. 265-281, 2018, Springer, 978-3-030-05377-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Guozhen Hu, Xuejing Kang, Zihui Guo, Xuanshu Luo |
A Novel Image Encryption Scheme Based on Hidden Random Disturbance and Feistel RPMPFrHT Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGTA ![In: Image and Graphics Technologies and Applications - 13th Conference on Image and Graphics Technologies and Applications, IGTA 2018, Beijing, China, April 8-10, 2018, Revised Selected Papers, pp. 252-262, 2018, Springer, 978-981-13-1701-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Akinori Hosoyamada, Yu Sasaki |
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings, pp. 386-403, 2018, Springer, 978-3-319-98112-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Dong Yang, Wen-Feng Qi 0001, Tian Tian 0004 |
All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 11(5), pp. 230-234, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Lei Zhang 0012, Wenling Wu |
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 11(3), pp. 121-128, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Donghoon Chang, Abhishek Kumar 0002, Somitra Kumar Sanadhya |
Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 27857-27867, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Tingting Lin, Xuejia Lai, Weijia Xue, Yin Jia |
A New Feistel-Type White-Box Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 32(2), pp. 386-395, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Asia Aljahdali, Michael Mascagni |
Feistel-inspired scrambling improves the quality of linear congruential generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Monte Carlo Methods Appl. ![In: Monte Carlo Methods Appl. 23(2), pp. 89, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Hector Bjoljahn Hougaard |
How to Generate Pseudorandom Permutations Over Other Groups: Even-Mansour and Feistel Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1707.01699, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Kwangsu Lee |
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1703.08306, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Ivan Tjuawinata, Tao Huang 0015, Hongjun Wu 0001 |
Improved Differential Cryptanalysis on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1194, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Akinori Hosoyamada, Yu Sasaki |
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1229, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Le Dong, Yongxia Mao |
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1071, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Xiaoyang Dong, Zheng Li 0008, Xiaoyun Wang 0001 |
Quantum Cryptanalysis on Some Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1249, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Xiaoyang Dong, Xiaoyun Wang 0001 |
Quantum Key-recovery Attack on Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1199, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Xuejun Dai, Yuhua Huang, Ningzhong Liu |
基于双伪随机变换和Feistel结构的轻量级分组密码VHF (VHF: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation and Feistel Structure). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 44(2), pp. 192-194, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Yuhua Huang, Xuejun Dai, Yangyang Shi, Ningzhong Liu, Qingxi Zeng, Fei Su |
基于Feistel结构的超轻量级分组密码算法(PFP) (Ultra-lightweight Block Cipher Algorithm (PFP) Based on Feistel Structure). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 44(3), pp. 163-167, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Valérie Nachef, Jacques Patarin, Emmanuel Volte |
Feistel Ciphers - Security Proofs and Cryptanalysis ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
DOI RDF |
|
18 | Yuanhao Deng, Chenhui Jin, Rongjia Li |
Meet in the Middle Attack on Type-1 Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 427-444, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Ivan Tjuawinata, Tao Huang 0015, Hongjun Wu 0001 |
Improved Differential Cryptanalysis on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings, pp. 302-324, 2017, Springer, 978-3-319-71666-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Rajdeep Chakraborty, Runa Seth, J. K. Mandal 0001 |
High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICBA (1) ![In: Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part I, pp. 485-494, 2017, Springer, 978-981-10-6426-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Ayesha Khalid, Muhammad Hassan, Goutam Paul 0001, Anupam Chattopadhyay |
RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 6(4), pp. 299-323, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro |
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 29(1), pp. 61-114, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Extended meet-in-the-middle attacks on some Feistel constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 80(3), pp. 587-618, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Thierry P. Berger, Julien Francq, Marine Minier, Gaël Thomas 0002 |
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 65(7), pp. 2074-2089, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Bensalah Mustapha, Mustapha Djeddou, Karim Drouiche |
An ultralightweight RFID authentication protocol based on Feistel cipher structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(18), pp. 6017-6033, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Mihir Bellare, Viet Tung Hoang, Stefano Tessaro |
Message-recovery attacks on Feistel-based Format Preserving Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 794, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Xiaoyang Dong, Xiaoyun Wang 0001 |
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 509, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Léo Perrin, Aleksei Udovenko |
Algebraic Insights into the Secret Feistel Network (Full version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 398, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Emmanuel Volte, Valérie Nachef, Nicolas Marrière |
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 136, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Adnan Baysal, Mustafa Çoban, Mehmet Özen |
Feistel Like Construction of Involutory Binary Matrices With High Branch Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 751, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1162, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Xiaoyang Dong, Xiaoyun Wang 0001 |
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2016(1), pp. 13-32, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2016(2), pp. 307-337, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Mihir Bellare, Viet Tung Hoang, Stefano Tessaro |
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 444-455, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki, Yosuke Todo |
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers, pp. 264-283, 2016, Springer, 978-3-319-69452-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Emmanuel Volte, Valérie Nachef, Nicolas Marrière |
Improvements of Attacks on Various Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 321-344, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Léo Perrin, Aleksei Udovenko |
Algebraic Insights into the Secret Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, pp. 378-398, 2016, Springer, 978-3-662-52992-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam |
10-Round Feistel is Indifferentiable from an Ideal Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (2) ![In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, pp. 649-678, 2016, Springer, 978-3-662-49895-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Valérie Nachef, Nicolas Marrière, Emmanuel Volte |
Improved Attacks on Extended Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 562-572, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Yuanxi Dai, John P. Steinberger |
Indifferentiability of 8-Round Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, pp. 95-120, 2016, Springer, 978-3-662-53017-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Le Dong, Yanling Wang, Wenling Wu, Jian Zou |
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 9(5), pp. 277-283, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci |
AKF: A key alternating Feistel scheme for lightweight cipher designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 115(2), pp. 359-367, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki |
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1), pp. 61-71, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Yosuke Todo |
Upper Bounds for the Security of Several Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1), pp. 39-48, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Anne Canteaut, Sébastien Duval, Gaëtan Leurent |
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 711, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Yuanxi Dai, John P. Steinberger |
Feistel Networks: Indifferentiability at 10 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 874, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | |
On the Security of Extended Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 734, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Céline Blondeau, Marine Minier |
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 141, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Alex Biryukov, Ivica Nikolic |
Complementing Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 426, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Yannick Seurin |
A Note on the Indifferentiability of the 10-Round Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 903, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam |
10-Round Feistel is Indifferentiable from an Ideal Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 876, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir |
New Attacks on Feistel Structures with Improved Memory Complexities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 146, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Yuanxi Dai, John P. Steinberger |
Feistel Networks: Indifferentiability at 8 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1069, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Li Lin 0003, Wenling Wu |
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 51, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang 0135, Zongbin Liu, Bingke Ma |
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 174, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Takanori Isobe 0001, Kyoji Shibutani |
Generic Key Recovery Attack on Feistel Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 526, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Alex Biryukov, Gaëtan Leurent, Léo Perrin |
Cryptanalysis of Feistel Networks with Secret Round Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 723, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh |
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers, pp. 108-124, 2015, Springer, 978-3-319-38897-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Anne Canteaut, Sébastien Duval, Gaëtan Leurent |
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 373-393, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Li Lin 0003, Wenling Wu, Yafei Zheng |
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 122-142, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Zhiyuan Guo, Wenling Wu, Si Gao |
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 352-372, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Alex Biryukov, Gaëtan Leurent, Léo Perrin |
Cryptanalysis of Feistel Networks with Secret Round Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 102-121, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Keonwoo Kim, Ku-Young Chang |
Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSA/CUTE ![In: Advances in Computer Science and Ubiquitous Computing - CSA & CUTE 2015, Cebu, Philippines, December 15-17, 2015, pp. 425-430, 2015, Springer, 978-981-10-0280-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Chun Guo 0002, Dongdai Lin |
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, pp. 110-133, 2015, Springer, 978-3-662-46493-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Céline Blondeau, Marine Minier |
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, pp. 92-113, 2015, Springer, 978-3-662-48115-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Huiling Zhang, Wenling Wu |
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings, pp. 218-237, 2015, Springer, 978-3-319-26616-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Thierry P. Berger, Marine Minier |
Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings, pp. 180-197, 2015, Springer, 978-3-319-26616-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir |
New Attacks on Feistel Structures with Improved Memory Complexities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 433-454, 2015, Springer, 978-3-662-47988-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Lei Zhang 0012, Wenling Wu |
Differential analysis of the Extended Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 114(12), pp. 723-727, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Shingo Yanagihara, Tetsu Iwata |
Type 1.x Generalized Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(4), pp. 952-963, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Kyoji Shibutani, Andrey Bogdanov |
Towards the optimality of Feistel ciphers with substitution-permutation functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 73(2), pp. 667-682, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Manuel Barbosa, Pooya Farshim |
The Related-Key Analysis of Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 93, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Valérie Nachef, Jacques Patarin, Emmanuel Volte |
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 446, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Rodolphe Lampe, Yannick Seurin |
Security Analysis of Key-Alternating Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 151, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Chun Guo 0002, Dongdai Lin |
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 786, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Le Dong, Wenling Wu, Shuang Wu 0004, Jian Zou |
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 8(3), pp. 513-525, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jun Peng, Liang Lei, Qi Han, Rong Jia |
A chaos-based block cipher with Feistel structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCI*CC ![In: IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, ICCI*CC 2014, London, UK, August 18-20, 2014, pp. 343-348, 2014, IEEE Computer Society, 978-1-4799-6080-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|