A Software-Optimized Encryption Algorithm (1997)

by Phillip Rogaway , Don Coppersmith
Citations:53 - 0 self

Active Bibliography

4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
4 Key-schedule cryptanalysis of idea, g-des, gost, safer and triple-des – John Kelsey, Bruce Schneier, David Wagner - 1996
54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
50 Unbalanced Feistel Networks and Block-Cipher Design – Bruce Schneier, John Kelsey - 1996
CryptoBytes – The Technical Newsletter
4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
The MARS Encryption Algorithm – Carolynn Burwick, Don Coppersmith, Edward D'Avignon, Edward D’avignon C, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Luke O'Connor, Stephen M. Matyas, David Safford, Nevenko Zunic, Luke O’connor D, Mohammad Peyravian
2 On Permutation Operations in Cipher Design – Ruby B. Lee, Z. J. Shi, Y. L. Yin - 2004
68 PRESENT: An Ultra-Lightweight Block Cipher – A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe - 2007
102 Tweakable block ciphers – Moses Liskov, Ronald L. Rivest, David Wagner - 2002
724 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
Implementation and Performance Analysis of Optimized SEAL Encryption On FPGA – R. Santosh Kumar Vinay Chowdary
Punjab (India) – Harsh Kumar Verma, Ravindra Kumar Singh
22 Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor – Bruce Schneier , Doug Whiting - 1997
21 Constructing symmetric ciphers using the CAST design procedure – Carlisle M. Adams - 1997
5 Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis – J. Lee, Howard M. Heys, S. E. Tavares - 1997
21 How to Strengthen DES Using Existing Hardware – Eli Biham , Alex Biryukov