Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,976,439 papers from all fields of science
Search
Sign In
Create Free Account
Feistel cipher
Known as:
Feistel network
, Unbalanced Feistel network
, Feistel structure
Expand
In cryptography, a Feistel cipher is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
BEAR and LION ciphers
Block cipher
Block size (cryptography)
CAST-256
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
A Cache Trace Attack on CAMELLIA
Rishabh Poddar
,
Amit Datta
,
C. Rebeiro
International Conference on Security Aspects in…
2011
Corpus ID: 18402975
CAMELLIA is a 128 bit block cipher certified for its security by NESSIE and CRYPTREC. Yet an implementation of CAMELLIA can…
Expand
2006
2006
KFC - The Krazy Feistel Cipher
Thomas Baignères
,
M. Finiasz
International Conference on the Theory and…
2006
Corpus ID: 10260965
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2005
2005
Cobweb posets as noncommutative prefabs
A.K.kwasniewski
2005
Corpus ID: 18145400
A class of new type graded infinite posets with minimal element is introduced. These so called cobweb posets proposed recently by…
Expand
Highly Cited
2004
Highly Cited
2004
Feistel Schemes and Bi-linear Cryptanalysis
N. Courtois
Annual International Cryptology Conference
2004
Corpus ID: 5125037
In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It…
Expand
2002
2002
Perceptual cryptography on MPEG-1 layer III bit-streams
A. Torrubia
,
F. Mora
Digest of Technical Papers. International…
2002
Corpus ID: 40800658
Whereas conventional cryptography is suitable for any kind of data, it does not allow for perceptual degradation of encrypted…
Expand
Highly Cited
2001
Highly Cited
2001
Cryptanalysis of Reduced-Round MISTY
Ulrich Kühn
International Conference on the Theory and…
2001
Corpus ID: 3670829
The block ciphers MISTY1 and MISTY2 proposed by Matsui are based on the principle of provable security against differential and…
Expand
2001
2001
Information leakage of Feistel ciphers
H. Heys
IEEE Transactions on Information Theory
2001
Corpus ID: 37423465
We examine the information leakage between sets of plaintext and ciphertext bits in symmetric-key block ciphers. The paper…
Expand
1984
1984
Simulation of a distributed expert-based information provision mechanism
N. Belkin
,
R. Hennings
,
T. Seeger
1984
Corpus ID: 51688612
In earlier work, a model o f the information provision mechanism (IPM) as a collective o f cooperating entities, each expert in a…
Expand
1978
1978
Optimum Receiver structures for Phase-Multiplexed Modulations
M. Simon
IEEE Transactions on Communications
1978
Corpus ID: 111078545
The problem of deriving "optimum" receiver structures for synchronization of BPSK, QPSK, and unbalanced QPSK (UQPSK) modulations…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required