About 136 results
Open links in new tab
  1. Our CCA-security bounds for generalized Feistel networks are described in Fig. 2. Let us briefly describe each result and how it compares with prior work.

  2. Besides DES, there exist several block ciphers today — the most popular of these being Blowfish, CAST-128, and KASUMI — that are also based on the Feistel structure.

  3. Horst Feistel’s Work before Employment at the IBM Research Center Works at the MIT Radiation Laboratory, Air Force Cambridge Research Center (AFCRC) and MIT Lincoln Laboratory on IFF …

  4. Feistel networks PRO: With enough rounds secure. CON: Hard to come up with invertible S-boxes. Feistel Networks will not need invertible components but will be secure.

  5. In the proceedings version, we only gave NCPA bounds for generalized Feistel, and took it for granted that due to the symmetry of Feistel, the inverse would have similar NCPA bounds, allowing us to …

  6. symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel, who did pioneering research while working for IBM; it is also …

  7. In this paper we focus on Feistel-network-like ciphers in a classical long-key scenario and we investigate some conditions which make such a construction immune to the partition-based attack introduced …