The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Feistel with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1997 (16) 1998-2001 (22) 2002-2003 (19) 2004 (15) 2005-2006 (17) 2007-2008 (28) 2009 (17) 2010 (19) 2011 (16) 2012-2013 (25) 2014 (18) 2015 (28) 2016 (21) 2017 (21) 2018 (21) 2019 (24) 2020 (22) 2021 (24) 2022 (30) 2023 (20) 2024 (10)
Publication types (Num. hits)
article(218) book(1) incollection(2) inproceedings(210) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 115 occurrences of 64 keywords

Results
Found 440 publication records. Showing 433 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Céline Blondeau, Andrey Bogdanov, Meiqin Wang On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jian Guo 0001, Jérémy Jean, Ivica Nikolic, Yu Sasaki Meet-in-the-Middle Attacks on Generic Feistel Constructions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Manuel Barbosa, Pooya Farshim The Related-Key Analysis of Feistel Constructions. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Rodolphe Lampe, Yannick Seurin Security Analysis of Key-Alternating Feistel Ciphers. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Hélène Le Bouder, Gaël Thomas 0002, Yanis Linge, Assia Tria On Fault Injections in Generalized Feistel Networks. Search on Bibsonomy FDTC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Marina Pudovkina, Alexander Toktarev Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Yongqiang Li 0001, Mingsheng Wang Constructing S-boxes for Lightweight Cryptography with Feistel Structure. Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Orhun Kara Square reflection cryptanalysis of 5-round Feistel networks with permutations. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Hideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda Round Addition Using Faults for Generalized Feistel Network. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Shingo Yanagihara, Tetsu Iwata Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov, Kyoji Shibutani Generalized Feistel networks revisited. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Thierry P. Berger, Marine Minier, Gaël Thomas 0002 Extended Generalized Feistel Networks Using Matrix Representation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Yu Sasaki Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul 0001 RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Sherif H. Abdel Haleem, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz Utilizing LFSR and Feistel networks in image encryption. Search on Bibsonomy ICECS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Takanori Isobe 0001, Kyoji Shibutani Generic Key Recovery Attack on Feistel Scheme. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Alex Biryukov, Ivica Nikolic Complementing Feistel Ciphers. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Yosuke Todo Upper Bounds for the Security of Several Feistel Networks. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Valérie Nachef, Emmanuel Volte, Jacques Patarin Differential Attacks on Generalized Feistel Schemes. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18HyungChul Kang, Deukjo Hong, Dukjae Moon, Daesung Kwon, Jaechul Sung, Seokhie Hong Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan Analysis of minimum numbers of linearly active S-boxes of a class of generalized feistel block ciphers. Search on Bibsonomy J. Syst. Sci. Complex. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ting Cui, Chenhui Jin Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function. Search on Bibsonomy J. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
18Rodolphe Lampe, Jacques Patarin Security of Feistel Schemes with New and Various Tools. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
18Yu Sasaki, Lei Wang 0031 Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Avradip Mandal, Jacques Patarin, Yannick Seurin On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Jacques Patarin, Benjamin Gittins, Joana Treger Increasing Block Sizes Using Feistel Networks: The Example of the AES. Search on Bibsonomy Cryptography and Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yu Sasaki Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Alex Biryukov Feistel Cipher. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov, Kyoji Shibutani Analysis of 3-line generalized Feistel networks with double SD-functions. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Aaram Yun, Je Hong Park, Jooyoung Lee On Lai-Massey and quasi-Feistel ciphers. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov On unbalanced Feistel networks with contracting MDS diffusion. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Valérie Nachef, Emmanuel Volte, Jacques Patarin Differential Attacks on Generalized Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
18Roman Oliynykov Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
18Avradip Mandal, Jacques Patarin, Yannick Seurin On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
18Shuai Chen, Renyi Shu Block Permutation Cipher in Chaos with Feistel Structure for Wireless Sensor Networks. Search on Bibsonomy CSISE (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yu Sasaki, Kan Yasuda Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov, Kyoji Shibutani Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri On Maximum Differential Probability of Generalized Feistel. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Shingo Yanagihara, Tetsu Iwata On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Roman Oliynykov, Ivan Gorbenko, Victor Dolgov, Dmytro Kaidalov Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation. Search on Bibsonomy IDAACS (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov On the differential and linear efficiency of balanced Feistel networks. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Didier Alquié 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
18Jacques Patarin Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
18Viet Tung Hoang, Phillip Rogaway On generalized Feistel networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
18Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Kyoji Shibutani On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Hidenori Kuwakado, Masakatu Morii Quantum distinguisher between the 3-round Feistel cipher and the random permutation. Search on Bibsonomy ISIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yuechuan Wei, Ping Li, Bing Sun 0001, Chao Li 0002 Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Emmanuel Volte, Valérie Nachef, Jacques Patarin Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Tomoyasu Suzaki, Kazuhiko Minematsu Improving the Generalized Feistel. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Ruilin Li, Bing Sun 0001, Chao Li 0002, Longjiang Qu Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yasutaka Igarashi, Toshinobu Kaneko On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher. Search on Bibsonomy ISITA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yevgeniy Dodis, Krzysztof Pietrzak Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Viet Tung Hoang, Phillip Rogaway On Generalized Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri A Related Key Attack on the Feistel Type Block Ciphers. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
18Ruilin Li, Bing Sun 0001, Chao Li 0002 Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
18Valérie Nachef Generic Attacks on Alternating Unbalanced Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
18Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
18Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
18Nianping Wang, Chenhui Jin Security evaluation against differential and linear cryptanalyses for Feistel ciphers. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Jun Peng, Shangzhu Jin, Hailing Liu, Yongguo Liu A Block Cipher Based on a Hybrid of Chaotic System and Feistel Network. Search on Bibsonomy ICNC (5) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Taizo Shirai, Kiyomichi Araki On Generalized Feistel Structures Using the Diffusion Switching Mechanism. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Jacques Patarin Generic Attacks on Feistel Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
18Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
18Aaram Yun, Je Hong Park, Jooyoung Lee Lai-Massey Scheme and Quasi-Feistel Networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
18Wenling Wu, Wentao Zhang, Dongdai Lin Security on Generalized Feistel Scheme with SP Round Function. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2006 DBLP  BibTeX  RDF
18Andrea Odorizzi, Chiara Taddia, Gianluca Mazzini On the application of wide-trail strategy to improve an extended feistel cryptosystem. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Alex Biryukov Feistel Cipher. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Duo Lei F-HASH: Securing Hash Functions Using Feistel Chaining. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
18Nicolas T. Courtois Feistel Schemes and Bi-Linear Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
18Wenling Wu, Wentao Zhang, Dongdai Lin Security on Generalized Feistel Scheme with SP Round Function. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
18Vasilios Katos Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. Search on Bibsonomy WOSIS The full citation details ... 2004 DBLP  BibTeX  RDF
18Makoto Sugita, Kazukuni Kobara, Hideki Imai Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2003 DBLP  BibTeX  RDF
18 Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
18Masayuki Kanda, Tsutomu Matsumoto On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2002 DBLP  BibTeX  RDF
18Howard M. Heys Information leakage of Feistel ciphers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Serge Vaudenay Feistel Ciphers with L2-Decorrelation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Bruce Schneier, John Kelsey Unbalanced Feistel Networks and Block Cipher Design. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Lars R. Knudsen Practically Secure Feistel Cyphers. Search on Bibsonomy FSE The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Richard Outerbridge Some Design Criteria for Feistel-Cipher Key Schedules. Search on Bibsonomy Cryptologia The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
14Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers Format-Preserving Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan Cryptanalysis of four-rounded DES using binary particleswarm optimization. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ga, pso, cryptanalysis, des, fitness function
14Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
14Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga Cache Timing Attacks on Clefia. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Marine Minier, Raphael C.-W. Phan, Benjamin Pousse Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key distinguishers, cryptanalysis, Block ciphers, Rijndael
14Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Junko Takahashi, Toshinori Fukunaga Improved Differential Fault Analysis on CLEFIA. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Wen Ji, Lei Hu Square Attack on Reduced-Round Zodiac Cipher. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zodiac, square attack, block cipher
14Yassin M. Hasan, Hesham A. Abulenein Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
14Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 433 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license