The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Feistel with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1997 (16) 1998-2001 (22) 2002-2003 (19) 2004 (15) 2005-2006 (17) 2007-2008 (28) 2009 (17) 2010 (19) 2011 (16) 2012-2013 (25) 2014 (18) 2015 (28) 2016 (21) 2017 (21) 2018 (21) 2019 (24) 2020 (22) 2021 (24) 2022 (30) 2023 (20) 2024 (10)
Publication types (Num. hits)
article(218) book(1) incollection(2) inproceedings(210) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 115 occurrences of 64 keywords

Results
Found 440 publication records. Showing 433 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Eli Biham, Orr Dunkelman, Nathan Keller A Related-Key Rectangle Attack on the Full KASUMI. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Tetsu Iwata, Kaoru Kurosawa How to Re-use Round Function in Super-Pseudorandom Permutation. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ludger Hemme A Differential Fault Attack Against Early Rounds of (Triple-)DES. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
14Hervé Ledig, Frédéric Muller, Frédéric Valette Enhancing Collision Attacks. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Frederiko Stenio de Araújo, Karla Darlene Nempomuceno Ramos, Benjamín René Callejas Bedregal, Ivan Saraiva Silva Papílio Cryptography Algorithm. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Pierre Dusart, Gilles Letourneux, Olivier Vivolo Differential Fault Analysis on A.E.S. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Duong Hieu Phan, David Pointcheval Chosen-Ciphertext Security without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Juan David González Cobas, José Antonio López Brugos How Many Rounds to KO?, or Complexity Increase by Cryptographic Map Iteration. Search on Bibsonomy EUROCAST The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Lu Xiao 0003, Howard M. Heys Hardware Performance Characterization of Block Cipher Structures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman Differential and Linear Cryptanalysis of a Reduced-Round SC2000. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Symmetric block cipher, SC2000, linear attack, probability, differential attack, characteristic
14Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa Non-cryptographic Primitive for Pseudorandom Permutation. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY type permutation, Block cipher, pseudorandomness
14Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
14Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
14Tetsu Iwata, Kaoru Kurosawa On the Universal Hash Functionsin Luby-Rackoff Cipher. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Provable Security, Cryptographic Primitives
14Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
14Alexander Klimov, Adi Shamir A New Class of Invertible Mappings. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Makoto Sugita, Kazukuni Kobara, Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis
14Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka The Block Cipher SC2000. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Shiho Moriai, Serge Vaudenay On the Pseudorandomness of Top-Level Schemes of Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Alex Biryukov, David A. Wagner 0001 Advanced Slide Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko Interpolation Attacks of the Block Cipher: SNAKE. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Jee Hea An, Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Thomas Pornin Optimal Resistance Against the Davies and Murphy Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Matthew Kwan The Design of the ICE Encryption Algorithm. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Babak Sadeghiyan, Josef Pieprzyk On Necessary and Sufficient Conditions for the Construction of Super Pseudorandom Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
14Bert den Boer Cryptanalysis of F.E.A.L. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
14Walter Fumy On the F-function of FEAL. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
14A. F. Webster, Stafford E. Tavares On the Design of S-Boxes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #433 of 433 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license