Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Generalized Feistel networks revisited
A Bogdanov, K Shibutani - Designs, codes and cryptography, 2013 - Springer
This work deals with the classification, security and efficiency of generalized Feistel
networks (GFNs) with 4 lines. We propose a definition of a GFN, essentially limiting …
networks (GFNs) with 4 lines. We propose a definition of a GFN, essentially limiting …
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
Y Sasaki, K Yasuda - … Encryption: 18th International Workshop, FSE 2011 …, 2011 - Springer
We present new attacks on the Feistel network, where each round function consists of a
subkey XOR, S-boxes, and then a linear transformation (ie, an SP round function). Our …
subkey XOR, S-boxes, and then a linear transformation (ie, an SP round function). Our …
Fast correlation attacks: Methods and countermeasures
W Meier - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
Fast correlation attacks have considerably evolved since their first appearance. They have
lead to new design criteria of stream ciphers, and have found applications in other areas of …
lead to new design criteria of stream ciphers, and have found applications in other areas of …
Differential attacks on generalized Feistel schemes
V Nachef, E Volte, J Patarin - … , CANS 2013, Paraty, Brazil, November 20 …, 2013 - Springer
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have
been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type …
been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type …
[Књига][B] Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual
International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo …
International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo …
On the impact of known-key attacks on hash functions
Hash functions are often constructed based on permutations or blockciphers, and security
proofs are typically done in the ideal permutation or cipher model. However, once these …
proofs are typically done in the ideal permutation or cipher model. However, once these …
Impossible differential properties of reduced round Streebog
In this paper, we investigate the impossible differential properties of the underlying block
cipher and compression function of the new cryptographic hashing standard of the Russian …
cipher and compression function of the new cryptographic hashing standard of the Russian …
[PDF][PDF] Etudes d'hypotheses algorithmiques et attaques de primitives cryptographiques
C Bouillaguet - 2011 - lip6.fr
Le premier chapitre de cette these reprend intégralement le texte de la brochure Sommes-
nous prisonniers des codes secrets, que j'ai écrite avec Pierre-Alain Fouque, et qui est …
nous prisonniers des codes secrets, que j'ai écrite avec Pierre-Alain Fouque, et qui est …
Known-key attacks on generalized Feistel schemes with SP round function
H Kang, D Hong, D Moon, D Kwon… - IEICE Transactions on …, 2012 - search.ieice.org
We present attacks on the generalized Feistel schemes, where each round function consists
of a subkey XOR, S-boxes, and then a linear transformation (ie a Substitution-Permutation …
of a subkey XOR, S-boxes, and then a linear transformation (ie a Substitution-Permutation …
Analysis of 3-line generalized Feistel networks with double SD-functions
A Bogdanov, K Shibutani - Information processing letters, 2011 - Elsevier
Generalized Feistel networks (GFN) are broadly employed in the design of primitives for
block ciphers, stream ciphers, and hash functions. Lately, endowing the functions of GFNs …
block ciphers, stream ciphers, and hash functions. Lately, endowing the functions of GFNs …