Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor |
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNDS ![In: Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings, pp. 530-539, 2014, Springer, 978-3-642-54524-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Céline Blondeau, Andrey Bogdanov, Meiqin Wang |
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings, pp. 271-288, 2014, Springer, 978-3-319-07535-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki |
Meet-in-the-Middle Attacks on Generic Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, pp. 458-477, 2014, Springer, 978-3-662-45610-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Manuel Barbosa, Pooya Farshim |
The Related-Key Analysis of Feistel Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, pp. 265-284, 2014, Springer, 978-3-662-46705-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Rodolphe Lampe, Yannick Seurin |
Security Analysis of Key-Alternating Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, pp. 243-264, 2014, Springer, 978-3-662-46705-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Hélène Le Bouder, Gaël Thomas 0002, Yanis Linge, Assia Tria |
On Fault Injections in Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014, pp. 83-93, 2014, IEEE Computer Society, 978-1-4799-6292-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Marina Pudovkina, Alexander Toktarev |
Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings, pp. 1-11, 2014, Springer, 978-3-662-44892-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Yongqiang Li 0001, Mingsheng Wang |
Constructing S-boxes for Lightweight Cryptography with Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, pp. 127-146, 2014, Springer, 978-3-662-44708-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Orhun Kara |
Square reflection cryptanalysis of 5-round Feistel networks with permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 113(19-21), pp. 827-831, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Hideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda |
Round Addition Using Faults for Generalized Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 96-D(1), pp. 146-150, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Shingo Yanagihara, Tetsu Iwata |
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1), pp. 2-14, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov, Kyoji Shibutani |
Generalized Feistel networks revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 66(1-3), pp. 75-97, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann |
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(8), pp. 1274-1279, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Thierry P. Berger, Marine Minier, Gaël Thomas 0002 |
Extended Generalized Feistel Networks Using Matrix Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers, pp. 289-305, 2013, Springer, 978-3-662-43413-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki |
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings, pp. 170-185, 2013, Springer, 978-3-642-38979-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul 0001 |
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 169-190, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Sherif H. Abdel Haleem, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz |
Utilizing LFSR and Feistel networks in image encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECS ![In: 20th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2013, Abu Dhabi, UAE, December 8-11, 2013, pp. 601-604, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Takanori Isobe 0001, Kyoji Shibutani |
Generic Key Recovery Attack on Feistel Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I, pp. 464-485, 2013, Springer, 978-3-642-42032-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Alex Biryukov, Ivica Nikolic |
Complementing Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers, pp. 3-18, 2013, Springer, 978-3-662-43932-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Yosuke Todo |
Upper Bounds for the Security of Several Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 302-317, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Valérie Nachef, Emmanuel Volte, Jacques Patarin |
Differential Attacks on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 1-19, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | HyungChul Kang, Deukjo Hong, Dukjae Moon, Daesung Kwon, Jaechul Sung, Seokhie Hong |
Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9), pp. 1550-1560, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong |
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(8), pp. 1379-1389, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan |
Analysis of minimum numbers of linearly active S-boxes of a class of generalized feistel block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Sci. Complex. ![In: J. Syst. Sci. Complex. 25(5), pp. 1014-1031, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Ting Cui, Chenhui Jin |
Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 7(2), pp. 282-287, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan |
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 169, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Rodolphe Lampe, Jacques Patarin |
Security of Feistel Schemes with New and Various Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 131, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Yu Sasaki, Lei Wang 0031 |
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers, pp. 234-251, 2012, Springer, 978-3-642-35998-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Avradip Mandal, Jacques Patarin, Yannick Seurin |
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 285-302, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Jacques Patarin, Benjamin Gittins, Joana Treger |
Increasing Block Sizes Using Feistel Networks: The Example of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography and Security ![In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 67-82, 2012, Springer, 978-3-642-28367-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar |
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 87-100, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki |
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, pp. 265-282, 2012, Springer, 978-3-642-34930-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Alex Biryukov |
Feistel Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 455, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov, Kyoji Shibutani |
Analysis of 3-line generalized Feistel networks with double SD-functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 111(13), pp. 656-660, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap |
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 3(3), pp. 141-164, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Aaram Yun, Je Hong Park, Jooyoung Lee |
On Lai-Massey and quasi-Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 58(1), pp. 45-72, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov |
On unbalanced Feistel networks with contracting MDS diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 59(1-3), pp. 35-58, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Valérie Nachef, Emmanuel Volte, Jacques Patarin |
Differential Attacks on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 705, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Roman Oliynykov |
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 685, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Avradip Mandal, Jacques Patarin, Yannick Seurin |
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 496, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Shuai Chen, Renyi Shu |
Block Permutation Cipher in Chaos with Feistel Structure for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSISE (2) ![In: Advances in Computer Science, Intelligent System and Environment [Proceedings of CSISE 2011, Volume 2, September 24-25, 2011, Guangzhou, China], pp. 391-396, 2011, Springer, 978-3-642-23755-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yu Sasaki, Kan Yasuda |
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, pp. 397-415, 2011, Springer, 978-3-642-21701-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov, Kyoji Shibutani |
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 106-119, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri |
On Maximum Differential Probability of Generalized Feistel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 89-105, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Shingo Yanagihara, Tetsu Iwata |
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 98-117, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Roman Oliynykov, Ivan Gorbenko, Victor Dolgov, Dmytro Kaidalov |
Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS (2) ![In: IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2011, Prague, Czech Republic, September 15-17, 2011, Volume 2, pp. 743-746, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov |
On the differential and linear efficiency of balanced Feistel networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 110(20), pp. 861-866, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Atsushi Mitsuda, Tetsu Iwata |
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1), pp. 13-21, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Didier Alquié |
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 71, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Jacques Patarin |
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 293, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Viet Tung Hoang, Phillip Rogaway |
On generalized Feistel networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 301, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque |
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers, pp. 18-35, 2010, Springer, 978-3-642-19573-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Kyoji Shibutani |
On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers, pp. 211-228, 2010, Springer, 978-3-642-19573-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Hidenori Kuwakado, Masakatu Morii |
Quantum distinguisher between the 3-round Feistel cipher and the random permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings, pp. 2682-2685, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yuechuan Wei, Ping Li, Bing Sun 0001, Chao Li 0002 |
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, pp. 105-122, 2010, 978-3-642-13707-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Emmanuel Volte, Valérie Nachef, Jacques Patarin |
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, pp. 94-111, 2010, Springer, 978-3-642-17372-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Tomoyasu Suzaki, Kazuhiko Minematsu |
Improving the Generalized Feistel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers, pp. 19-39, 2010, Springer, 978-3-642-13857-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Ruilin Li, Bing Sun 0001, Chao Li 0002, Longjiang Qu |
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 1-18, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yasutaka Igarashi, Toshinobu Kaneko |
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2010, 17-20 October 2010, Taichung, Taiwan, pp. 784-788, 2010, IEEE, 978-1-4244-6017-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yevgeniy Dodis, Krzysztof Pietrzak |
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, pp. 21-40, 2010, Springer, 978-3-642-14622-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Viet Tung Hoang, Phillip Rogaway |
On Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, pp. 613-630, 2010, Springer, 978-3-642-14622-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri |
A Related Key Attack on the Feistel Type Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 8(3), pp. 221-226, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Ruilin Li, Bing Sun 0001, Chao Li 0002 |
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 360, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Valérie Nachef |
Generic Attacks on Alternating Unbalanced Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 287, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque |
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 634, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap |
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 178, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Nianping Wang, Chenhui Jin |
Security evaluation against differential and linear cryptanalyses for Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 3(4), pp. 494-502, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Jun Peng, Shangzhu Jin, Hailing Liu, Yongguo Liu |
A Block Cipher Based on a Hybrid of Chaotic System and Feistel Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (5) ![In: Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes, pp. 427-431, 2009, IEEE Computer Society, 978-0-7695-3736-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Taizo Shirai, Kiyomichi Araki |
On Generalized Feistel Structures Using the Diffusion Switching Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(8), pp. 2120-2129, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jacques Patarin |
Generic Attacks on Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
18 | Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis |
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 184(1), pp. 63-72, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 449, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
18 | Aaram Yun, Je Hong Park, Jooyoung Lee |
Lai-Massey Scheme and Quasi-Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 347, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
18 | Wenling Wu, Wentao Zhang, Dongdai Lin |
Security on Generalized Feistel Scheme with SP Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 3(3), pp. 215-224, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
18 | Andrea Odorizzi, Chiara Taddia, Gianluca Mazzini |
On the application of wide-trail strategy to improve an extended feistel cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 53-II(2), pp. 125-127, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Alex Biryukov |
Feistel Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Duo Lei |
F-HASH: Securing Hash Functions Using Feistel Chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 430, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
18 | Nicolas T. Courtois |
Feistel Schemes and Bi-Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 251, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
18 | Wenling Wu, Wentao Zhang, Dongdai Lin |
Security on Generalized Feistel Scheme with SP Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 337, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
18 | Vasilios Katos |
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004, pp. 79-87, 2004, INSTICC Press, 972-8865-07-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
18 | Makoto Sugita, Kazukuni Kobara, Hideki Imai |
Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1), pp. 2-12, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
18 | |
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 43, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
18 | Masayuki Kanda, Tsutomu Matsumoto |
On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1), pp. 25-37, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
18 | Howard M. Heys |
Information leakage of Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 47(1), pp. 23-35, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Serge Vaudenay |
Feistel Ciphers with L2-Decorrelation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 1-14, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Bruce Schneier, John Kelsey |
Unbalanced Feistel Networks and Block Cipher Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings, pp. 121-144, 1996, Springer, 3-540-60865-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Lars R. Knudsen |
Practically Secure Feistel Cyphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings, pp. 211-221, 1993, Springer, 3-540-58108-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
18 | Richard Outerbridge |
Some Design Criteria for Feistel-Cipher Key Schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 10(3), pp. 142-156, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
14 | Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers |
Format-Preserving Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 295-312, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan |
Cryptanalysis of four-rounded DES using binary particleswarm optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2161-2166, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ga, pso, cryptanalysis, des, fitness function |
14 | Jiali Choy, Huihui Yap |
Impossible Boomerang Attack for Block Cipher Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 22-37, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers |
14 | Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga |
Cache Timing Attacks on Clefia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 104-118, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Marine Minier, Raphael C.-W. Phan, Benjamin Pousse |
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 60-76, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
known-key distinguishers, cryptanalysis, Block ciphers, Rijndael |
14 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 355-371, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Junko Takahashi, Toshinori Fukunaga |
Improved Differential Fault Analysis on CLEFIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 25-34, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Wen Ji, Lei Hu |
Square Attack on Reduced-Round Zodiac Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 377-391, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Zodiac, square attack, block cipher |
14 | Yassin M. Hasan, Hesham A. Abulenein |
Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 254-259, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improving the Time Complexity of Matsui's Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 77-88, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fast Fourier Transform, block ciphers, linear cryptanalysis |
14 | Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann |
Block Ciphers Sensitive to Gröbner Basis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 313-331, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|