Security evaluation against differential and linear cryptanalyses for Feistel ciphers.
Nianping WangChenhui JinPublished in: Frontiers Comput. Sci. China (2009)
Keyphrases
- stream cipher
- security mechanisms
- linear constraints
- evaluation model
- intrusion detection
- computer security
- security requirements
- security issues
- information security
- evaluation criteria
- network security
- smart card
- closed form
- security model
- security systems
- security level
- malware detection
- security problems
- data sets
- chosen plaintext