This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.
Sunday, July 30, 2017
Feistel Ciphers: Security Proofs And Cryptanalysis
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.
Subscribe to:
Post Comments (Atom)
The Colt 1911 Pistol (Osprey Weapon 9)
Download The Colt 1911 Pistol (Osprey Weapon 9) First used in combat during the Punitive Expedition into Me...
-
Download Invision Power Board 2: A User Guide. This book is your guide to configuring, managing and maintai...
-
Download Drawdown: The Most Comprehensive Plan Ever Proposed To Reverse Global Warming The 100 most substan...
-
Download The Grant Cardone Rebuttal Manual 200+ Page Rebuttal Manual. Learn to handle any objection with th...
No comments:
Post a Comment