Fast Software Encryption Functions (1998)

View PDF

Download Links

by Ralph C. Merkle
Citations:45 - 0 self

Active Bibliography

861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
3188 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
277 Selecting Cryptographic Key Sizes – Arjen K. Lenstra, Eric R. Verheul - 2001
93 How to protect DES against exhaustive key search – Joe Kilian, Phillip Rogaway - 1996
74 Efficient DES key search – Michael J. Wiener - 1994
52 Defect tolerance in VLSI circuits: Techniques and yield analysis – Israel Koren, Zahava Koren - 1998
58 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
53 On the Security of Multiple Encryption – Ralph C. Merkle, Martin E. Hellman - 1981
36 A Known-Plaintext Attack on Two-Key Triple Encryption – Paul C. Van Oorschot, Michael J. Wiener - 1990