Recent Developments in the Design of Conventional Cryptographic Algorithms (1998)

by Bart Preneel , Vincent Rijmen , Antoon Bosselaers
Venue:Computer Security and Industrial Cryptography - State of the Art and Evolution, LNCS
Citations:10 - 2 self

Active Bibliography

4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
Fast Encryption for Set-Top Technologies – Stefan Lucks, Rüdiger Weis, Volker Hilt - 1999
8 A Secure, Accountable, and Collaborative Whiteboard – Werner Geyer, Rüdiger Weis, Praktische Informatik - 1998
45 Survey and Benchmark of Block Ciphers for Wireless Sensor Networks – Yee Wei Law, Jeroen Doumen, Pieter Hartel - 2004
15 On the Construction of Variable-Input-Length Ciphers – Mihir Bellare, Giovanni Di Crescenzo, Phillip Rogaway - 1998
Elastic Block Ciphers: Method, Security and Instantiations – Debra L. Cook, Moti Yung, Angelos D. Keromytis
50 Unbalanced Feistel Networks and Block-Cipher Design – Bruce Schneier, John Kelsey - 1996
9 Bit Permutation Instructions: Architecture, Implementation and Cryptographic Properties – Zhijie Jerry Shi - 2004
35 Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps – Goce Jakimoski, Ljupčo Kocarev, Senior Member - 2001
The MARS Encryption Algorithm – Carolynn Burwick, Don Coppersmith, Edward D'Avignon, Edward D’avignon C, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Luke O'Connor, Stephen M. Matyas, David Safford, Nevenko Zunic, Luke O’connor D, Mohammad Peyravian
68 PRESENT: An Ultra-Lightweight Block Cipher – A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe - 2007
Architectural Techniques for Enabling Secure Cryptographic Processing – John Patrick McGregor ,Jr. - 2005
2 On Permutation Operations in Cipher Design – Ruby B. Lee, Z. J. Shi, Y. L. Yin - 2004
12 SHA: A Design for Parallel Architectures? – Antoon Bosselaers, Rene Govaerts, Joos Vandewalle, Joos V - 1997
3 On the Security of Double and 2-Key Triple Modes of Operation – Helena Handschuh, Bart Preneel
1 Efficient Symmetric-Key Ciphers Based on an NP-Complete Subproblem – Matt Blaze - 1996