Diffusion analysis af a scalable fiestel network
A generalization of the concepts of Feistel Networks (FN), known as Extended Feistel Network (EFN) is examined. EFN split the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F function. The function...
| Main Authors: | Ibrahim, Subariah, Maarof, Mohd. Aizaini |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3256/ |
Similar Items
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
The scalability challenge of the blockchain:
a review
by: Rahiman, Musharaf Unissa, et al.
Published: (2019)
by: Rahiman, Musharaf Unissa, et al.
Published: (2019)
Scalable Text Filtering System
by: Foong, Oi Mean, et al.
Published: (2006)
by: Foong, Oi Mean, et al.
Published: (2006)
Leveraging proactive flow to improve scalability in software defined networking / Oseghale Osemudiamen Victor
by: Oseghale , Osemudiamen Victor
Published: (2019)
by: Oseghale , Osemudiamen Victor
Published: (2019)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Automated Fertigation Mobile Application (Mobile-AFS)
by: Loh, Zi Hao
Published: (2023)
by: Loh, Zi Hao
Published: (2023)
A Scalable Algorithm for Constructing Frequent Pattern Tree
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Semantic-Based Scalable Decentralized Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
A scalable and secure position-based routing protocol for ad-hoc networks / Liana K. M. Qabajeh
by: Qabajeh, Liana K. M.
Published: (2012)
by: Qabajeh, Liana K. M.
Published: (2012)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Scalable Self-Organizing Model for Grid Resource Discovery
by: Mahamat Issa, Hassan, et al.
Published: (2008)
by: Mahamat Issa, Hassan, et al.
Published: (2008)
Semantic-Based Scalable Decentralized Grid Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2009)
by: Mahamat Issa , Hassan, et al.
Published: (2009)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A Scalable QoS Scheduling Architecture For WiMAX Multi-Hop Relay Networks.
by: Tat, Chee Wan, et al.
Published: (2010)
by: Tat, Chee Wan, et al.
Published: (2010)
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
by: Hassan, Mahamat. I, et al.
Published: (2010)
by: Hassan, Mahamat. I, et al.
Published: (2010)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Data embedding using predictive syntax elements in scalable coded video / Pang Lie Lin
by: Pang , Lie Lin
Published: (2021)
by: Pang , Lie Lin
Published: (2021)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Similar Items
-
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006) -
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005) -
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006) -
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)