We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,662 results
  1. CCA security for contracting (quasi-)Feistel constructions with tight round complexity

    Feistel constructions using contracting round functions were introduced in 1990s and generalized by Yun et al. (Des Codes Cryptogr 58(1):45–72, 2011)...

    Chun Guo, Ling Song in Designs, Codes and Cryptography
    Article 23 March 2024
  2. Feistel Ciphers Based on a Single Primitive

    We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the...
    Kento Tsuji, Tetsu Iwata in Cryptography and Coding
    Conference paper 2024
  3. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers

    In this paper, we study the security of the Key-Alternating Feistel (KAF) ciphers, a class of key alternating ciphers with the Feistel structure,...

    Arghya Bhattacharjee, Ritam Bhaumik, ... Anik Raychaudhuri in Designs, Codes and Cryptography
    Article Open access 04 October 2023
  4. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks

    Farfalle is a permutation-based construction for building a pseudorandom function which has been proposed by Bertoni et al. in 2017. In this work, we...

    S. Hodžić, A. Roy, E. Andreeva in Designs, Codes and Cryptography
    Article 12 October 2023
  5. Generalized Feistel Ciphers for Efficient Prime Field Masking

    A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked...
    Lorenzo Grassi, Loïc Masure, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  6. Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion

    This paper proposes a bit-level image encryption algorithm based on six-dimensional hyperchaotic system. First, the image is divided into 8 bit-level...

    **qing Li, Jia Wang, **aoqiang Di in Multimedia Tools and Applications
    Article 02 June 2022
  7. Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles

    The Feistel-2 (a.k.a, Feistel-KF) structure is a variant of the Feistel structure such that the i-th round function is given by...
    Takanori Daiza, Kazuki Yoneyama in Advances in Information and Computer Security
    Conference paper 2022
  8. Automated Meet-in-the-Middle Attack Goes to Feistel

    Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and...
    Qingliang Hou, **aoyang Dong, ... **aoyun Wang in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  9. Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes

    In this paper, we provide new quantum cryptanalysis results on 5 rounds (balanced) Feistel schemes and on Benes schemes. More precisely, we give an...
    Maya Chartouny, Jacques Patarin, Ambre Toulemonde in Codes, Cryptology and Information Security
    Conference paper 2023
  10. SCENERY: a lightweight block cipher based on Feistel structure

    In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...

    **gya Feng, Lang Li in Frontiers of Computer Science
    Article 11 November 2021
  11. Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks

    Recent works have revisited blockcipher structures to achieve MPC- and ZKP-friendly designs. In particular, Albrecht et al. (EUROCRYPT 2015) first...
    Yuqing Zhao, Chun Guo, Weijia Wang in Cryptology and Network Security
    Conference paper 2023
  12. Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks

    A generalized Feistel network (GFN) is a classical approach to constructing a blockcipher from pseudorandom functions (PRFs). Recently, Nakaya and...
    Conference paper 2024
  13. Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption

    In this work, we will propose a new color image encryption technique using chaotic maps and based on an improved Feistel scheme. This scheme is...
    Hicham Rrghout, Mourad Kattass, ... Abdelhamid Benazzi in Computing, Internet of Things and Data Analytics
    Conference paper 2024
  14. A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box

    In this paper, a novel chaos-based dynamic encryption scheme with a permutation-substitution structure is presented. The S-boxes and P-boxes of the...

    Maryam Mousavi, Babak Sadeghiyan in Multimedia Tools and Applications
    Article 13 January 2021
  15. Optimum Attack on 3-Round Feistel-2 Structure

    Feistel-2 structure is a variant of Feistel structure such that the...
    Takanori Daiza, Kaoru Kurosawa in Advances in Information and Computer Security
    Conference paper 2021
  16. SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations

    We revisit designing AND-RX block ciphers, that is, the designs assembled with the most fundamental binary operations—AND, Rotation and XOR...

    Shiyao Chen, Yanhong Fan, ... Chun Guo in Designs, Codes and Cryptography
    Article 19 November 2021
  17. Quantum Attacks on Lai-Massey Structure

    Aaram Yun et al. considered that Lai-Massey structure has the same security as Feistel structure. However, Luo et al. showed that 3-round Lai-Massey...
    Shu** Mao, Tingting Guo, ... Lei Hu in Post-Quantum Cryptography
    Conference paper 2022
  18. New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks

    The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were proposed in the literature, leading...
    Stéphanie Delaune, Patrick Derbez, ... Charles Prud’homme in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  19. Beyond-birthday security for permutation-based Feistel networks

    Initiated by Luby and Rackoff (SIAM J. Computing, ’88), the information theoretic security of Feistel networks built upon random functions has been...

    Chun Guo, Guoyan Zhang in Designs, Codes and Cryptography
    Article 02 January 2021
  20. On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC

    Recent practical applications using advanced cryptographic protocols such as multi-party computations (MPC) and zero-knowledge proofs (ZKP) have...
    Jiamin Cui, Kai Hu, ... Puwen Wei in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.