6Feistel Networks
In this chapter we will cover the following:
Cryptographic keys
Feistel functions
Pseudo-Hadamard transforms
MDS matrix
S-boxes and P-boxes
Symmetric algorithms
Methods for improving symmetric algorithms
This chapter ...
Get Modern Cryptography: Applied Mathematics for Encryption and Information Security now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.