Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Unbalanced Feistel networks and block cipher design - MaRDI portal

Unbalanced Feistel networks and block cipher design

From MaRDI portal
Publication:4593790

DOI10.1007/3-540-60865-6_49zbMath1373.94930OpenAlexW1591620981WikidataQ56235049 ScholiaQ56235049MaRDI QIDQ4593790

John Kelsey, Bruce Schneier

Publication date: 15 November 2017

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-60865-6_49




Related Items (23)

Related-key analysis of generalized Feistel networks with expanding round functionsCollision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256О групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys partsQuantum attacks on generalized Feistel networks based on the strong-weak separabilityProof of mirror theory for a wide range of \(\xi_{\max }\)On Lai-Massey and quasi-Feistel ciphersOn unbalanced feistel networks with contracting MDS diffusionGeneric Attacks on Unbalanced Feistel Schemes with Expanding FunctionsCryptographic properties and application of a generalized unbalanced Feistel network structureGeneric attacks with standard deviation analysis on a-Feistel schemesDeterministic encryption with the Thorp shuffleA randomness test for block ciphersAn efficient format-preserving encryption mode for practical domainsBuilding blockcipher from small-block tweakable blockcipherLinear provable security for a class of unbalanced Feistel networkA formal analysis of prefetching in profiled cache-timing attacks on block ciphersCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureProvable related-key security of contracting Feistel networksGeneric Attacks on Feistel Networks with Internal PermutationsThe “Coefficients H” TechniqueUnnamed ItemUnnamed Item






This page was built for publication: Unbalanced Feistel networks and block cipher design