Sciweavers

16 search results - page 4 / 4
» Conversion and Proxy Functions for Symmetric Key Ciphers
Sort
View
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway