Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
4
views
34
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,121
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Feistel Ciphers
GOST, SIMON, BEAR-LION, CAST-256, CLEFIA
other
Author(s):
Valerie Nachef
,
Jacques Patarin
,
Emmanuel Volte
Publication date
(Online):
February 22 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Research
Most cited references
34
Record
: found
Abstract
: not found
Book Chapter
: not found
The Boomerang Attack
David V Wagner
(1999)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Taizo Shirai
,
Kyoji Shibutani
,
Toru Akishita
…
(2007)
0
comments
Cited
42
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
Youngdai Ko
,
Seokhie Hong
,
Wonil Lee
…
(2004)
0
comments
Cited
14
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
February 22 2017
Pages
: 177-190
DOI:
10.1007/978-3-319-49530-9_12
SO-VID:
35f94c2a-a81c-4746-b8f9-8ed569c847e1
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Introduction: General Definitions
pp. 11
Balanced Feistel Ciphers, First Properties
pp. 21
The H-Coefficient Method
pp. 45
Luby-Rackoff Theorems
pp. 57
Introduction to Cryptanalysis and Generic Attacks
pp. 65
Generic Attacks on Classical Feistel Ciphers
pp. 75
Generic Attacks on Classical Feistel Ciphers with Internal Permutations
pp. 95
Generic Attacks on Contracting Feistel Ciphers
pp. 117
Generic Attacks on Expanding Feistel Ciphers
pp. 139
Generic Attacks on Generalized Feistel Ciphers
pp. 157
DES and Variants: 3DES, DES – X
pp. 177
GOST, SIMON, BEAR-LION, CAST-256, CLEFIA
pp. 193
Proof Beyond the Birthday Bound with the Coupling Technique
pp. 203
Introduction to Mirror Theory
pp. 223
“P i ⊕ P j Theorem” When ξ max = 2
pp. 257
“P i ⊕ P j Theorem” on Standard Systems and “P i ⊕ P j Theorem” with Any ξ max
pp. 271
Proofs Beyond the Birthday Bound on Ψ k with the H-Coefficient Method
pp. 291
Indifferentiability
Similar content
5,121
La "Thiende" de Simon Stevin.
Authors:
D. M. SMITH
,
H Bosmans
P-wave Indices as Predictors of Atrial Fibrillation: The Lion from a Claw
Authors:
Georgios Giannopoulos
,
Dimitrios Tachmatzidis
,
Dimitrios V. Moysidis
…
Hybrid lion–GA optimization algorithm-based task scheduling approach in cloud computing
Authors:
K. Malathi
,
K. Priyadarsini
See all similar