# Feistel cipher

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

- 2017

This paper presents a Format preserving encryption algorithm using Feistel Cipher. Cryptography is a useful technique to transmitâ€¦Â (More)

Is this relevant?

Highly Cited

2011

Highly Cited

2011

- IACR Cryptology ePrint Archive
- 2011

In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, theâ€¦Â (More)

Is this relevant?

2010

2010

- IEEE International Symposium on Informationâ€¦
- 2010

No polynomial classical algorithms can distinguish between the 3-round Feistel cipher with internal permutations and a randomâ€¦Â (More)

Is this relevant?

2006

2006

- ASIACRYPT
- 2006

We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-likeâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- CRYPTO
- 2004

We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k theâ€¦Â (More)

Is this relevant?

2004

2004

- 2004

We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differentlyâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- 2001

This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present severalâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- 1998

In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create newâ€¦Â (More)

Is this relevant?

Review

1996

Review

1996

- FSE
- 1996

We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Likeâ€¦Â (More)

Is this relevant?

Highly Cited

1991

Highly Cited

1991

- EUROCRYPT
- 1991

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamirâ€¦Â (More)

Is this relevant?