Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
297
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Feistel Ciphers
other
Author(s):
Valerie Nachef
,
Jacques Patarin
,
Emmanuel Volte
Publication date
(Print):
2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book
ISBN (Print):
978-3-319-49528-6
ISBN (Electronic):
978-3-319-49530-9
Publication date (Print):
2017
DOI:
10.1007/978-3-319-49530-9
SO-VID:
0720ee82-1b11-4ecf-a4a7-0ea23021592a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Introduction: General Definitions
pp. 11
Balanced Feistel Ciphers, First Properties
pp. 21
The H-Coefficient Method
pp. 45
Luby-Rackoff Theorems
pp. 57
Introduction to Cryptanalysis and Generic Attacks
pp. 65
Generic Attacks on Classical Feistel Ciphers
pp. 75
Generic Attacks on Classical Feistel Ciphers with Internal Permutations
pp. 95
Generic Attacks on Contracting Feistel Ciphers
pp. 117
Generic Attacks on Expanding Feistel Ciphers
pp. 139
Generic Attacks on Generalized Feistel Ciphers
pp. 157
DES and Variants: 3DES, DES – X
pp. 177
GOST, SIMON, BEAR-LION, CAST-256, CLEFIA
pp. 193
Proof Beyond the Birthday Bound with the Coupling Technique
pp. 203
Introduction to Mirror Theory
pp. 223
“P i ⊕ P j Theorem” When ξ max = 2
pp. 257
“P i ⊕ P j Theorem” on Standard Systems and “P i ⊕ P j Theorem” with Any ξ max
pp. 271
Proofs Beyond the Birthday Bound on Ψ k with the H-Coefficient Method
pp. 291
Indifferentiability
Similar content
297
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput
Authors:
Thierry Berger
,
Julien Francq
,
Marine Minier
…
The algebra of Feistel-Toffoli schemes
Authors:
Laurent Poinsot
,
Hans-E. Porst
Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network
Authors:
Donghoon Chang
,
Abhishek Kumar
,
Somitra Kumar Sanadhya
See all similar
Cited by
2
Image Encryption Using Value-Differencing Transformation and Modified ZigZag Transformation
Authors:
Zhongyun Hua
,
Jiaxin Li
,
Yuanman Li
…
The Relation Between CENC and NEMO
Authors:
Bart Mennink
See all cited by