Sciweavers

Share
CRYPTO   2010 Advances in Cryptology
Wall of Fame | Most Viewed CRYPTO-2010 Paper
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
8 years 11 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source228
2Download preprint from source208
3Download preprint from source201
4Download preprint from source197
5Download preprint from source195
6Download preprint from source189
7Download preprint from source188
8Download preprint from source188
9Download preprint from source186
10Download preprint from source181
11Download preprint from source171
12Download preprint from source170
13Download preprint from source167
14Download preprint from source162
15Download preprint from source158
16Download preprint from source157
17Download preprint from source157
18Download preprint from source157
19Download preprint from source151
20Download preprint from source145
21Download preprint from source144
22Download preprint from source141
23Download preprint from source140
24Download preprint from source139
25Download preprint from source132
26Download preprint from source121
27Download preprint from source120
28Download preprint from source110
29Download preprint from source109
30Download preprint from source109
books