Academic literature on the topic 'Extended Feistel Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Extended Feistel Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Extended Feistel Network"

1

Liu, Jiajie, Bing Sun, and Chao Li. "New Approach towards Generalizing Feistel Networks and Its Provable Security." Security and Communication Networks 2021 (September 23, 2021): 1–26. http://dx.doi.org/10.1155/2021/2751797.

Full text
Abstract:
This paper proposes a new approach to generalizing Feistel networks, which unifies the classical (balanced) Feistel network and the Lai–Massey structure. We call the new structure extended Feistel (E-Feistel) network. To justify its soundness, we investigate its indistinguishability using Patarin’s H-coefficient technique. As a result, it is proved that the 4-round key-alternating E-Feistel (KAEF) cipher with adequately derived keys and identical round functions is secure up to 2 n / 2 queries, i.e., birthday-bound security. In addition, when adjacent round keys are independent and independent
APA, Harvard, Vancouver, ISO, and other styles
2

Sadikin, Mohamad Ali, and Bety Hayat Susanti. "Design of AL-13 Block Cipher Algorithm Based On Extended Feistel Network." Journal of Physics: Conference Series 1127 (January 2019): 012027. http://dx.doi.org/10.1088/1742-6596/1127/1/012027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abeer, F. Shimal, H. Helal Baydaa, and T. Hashim Ashwaq. "Extended of TEA: A 256 bits block cipher algorithm for image encryption." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 3996–4007. https://doi.org/10.11591/ijece.v11i5.pp3996-4007.

Full text
Abstract:
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size
APA, Harvard, Vancouver, ISO, and other styles
4

Shimal, Abeer F., Baydaa H. Helal, and Ashwaq T. Hashim. "Extended of TEA: A 256 bits block cipher algorithm for image encryption." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 3996. http://dx.doi.org/10.11591/ijece.v11i5.pp3996-4007.

Full text
Abstract:
<p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the bl
APA, Harvard, Vancouver, ISO, and other styles
5

Dawood, Omar. "SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes." Iraqi Journal For Computer Science and Mathematics 5, no. 3 (2024): 213–28. http://dx.doi.org/10.52866/ijcsm.2024.05.03.011.

Full text
Abstract:
With the recent increase in the risks and attacks facing our daily lives and digital environment around us,the trend towards securing data has become inevitable. Block ciphers play a crucial role in modern crypto-applicationssuch as secure network storage and signatures and are used to safeguard sensitive information. The present paperdevelops a new variant of the symmetric model called SUMER family ciphers with three equivalent modes: lightweight,conventional (traditional), and extended ciphers. SUMER name belongs to one of the oldest civilizations inMesopotamia and stands for Secure Universa
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Lei, and Wenling Wu. "Differential analysis of the Extended Generalized Feistel Networks." Information Processing Letters 114, no. 12 (2014): 723–27. http://dx.doi.org/10.1016/j.ipl.2014.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nugroho, Kristiawan, De Rosal Ignatius Moses Setiadi, Eri Zuliarso, Aceng Sambas, and Omar Farooq. "FeistelX network-based image encryption leveraging hyperchaotic fusion and extended DNA coding." Egyptian Informatics Journal 31 (September 2025): 100716. https://doi.org/10.1016/j.eij.2025.100716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berger, Thierry P., Julien Francq, Marine Minier, and Gael Thomas. "Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput." IEEE Transactions on Computers 65, no. 7 (2016): 2074–89. http://dx.doi.org/10.1109/tc.2015.2468218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zheng, Yafei, and Wenling Wu. "Similarity Property and Slide Attack of Block Cipher FESH." IET Information Security 2023 (December 14, 2023): 1–8. http://dx.doi.org/10.1049/2023/7171600.

Full text
Abstract:
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. Based on the similarity properties, extended slide properties can be constructed for FESH. Slide attacks of FESH are then proposed. The similarity properties and extended slide prop
APA, Harvard, Vancouver, ISO, and other styles
10

Subariah, Ibrahim, and Aizaini Maarof Mohd. "Diffusion Analysis of a Scalable Feistel Network." May 27, 2007. https://doi.org/10.5281/zenodo.1072337.

Full text
Abstract:
A generalization of the concepts of Feistel Networks (FN), known as Extended Feistel Network (EFN) is examined. EFN splits the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F function. The function plays a key role in the diffusion process due to its completeness property. It is also important to note that in EFN the F-function is the most computationally expensive operation in a round. The aim of this paper is to determine a suitable type of EFN for a scalable cipher. This is done by analyzing
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Extended Feistel Network"

1

Nachef, Valérie, Nicolas Marrière, and Emmanuel Volte. "Improved Attacks on Extended Generalized Feistel Networks." In Cryptology and Network Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48965-0_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sasaki, Yu, and Yosuke Todo. "New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69453-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berger, Thierry P., Marine Minier, and Gaël Thomas. "Extended Generalized Feistel Networks Using Matrix Representation." In Selected Areas in Cryptography -- SAC 2013. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43414-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yap, Huihui. "Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10240-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Turnbull, Sue, and Marion McCutcheon. "Valuing Miss Fisher." In Transnational TV Crime. Edinburgh University Press, 2024. https://doi.org/10.3366/edinburgh/9781474496810.003.0003.

Full text
Abstract:
This chapter applies our concept of total value to a discussion of the Australian TV crime drama series, Miss Fisher’s Murder Mysteries (ABC 2012-2015) one of Australia’s most successful TV exports. Miss Fisher has been sold to an unprecedented 247 territories in 179 countries and is available on a range of different networks and platforms thus illustrating the potential reach of a TV crime drama in the new streaming environment. The original series has also generated a spin-off, Miss Fisher’s Modern Murder Mysteries, a film Miss Fisher and the Crypt of Tears (2020) partly funded through a cro
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Extended Feistel Network"

1

Dong, Xinfeng, You Wu, Yu Zhou, Hao Tan, and Wenzheng Zhang. "Analysis of Security for a New Kind of an Extended Generalized Feistel Network." In ADMIT 2024: 2024 3rd International Conference on Algorithms, Data Mining, and Information Technology. ACM, 2024. https://doi.org/10.1145/3701100.3701263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!