Cryptography Reference
In-Depth Information
Computer Science, Vol. 1008. (Springer-Verlag, Berlin, 1995);
http://iteseer.ist.psu.edu/knud-
[10] Kenji Koyama and Routo Terada. How to strengthen des-like cryptosystems against differential cryptana-
lysis.
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
E76-A
(1):
63-69 (1993).
[11] Xuejia Lai. Higher order derivatives and differential cryptanalysis. In
Proceedings of Symposium on Com-
munication, Coding and Cryptography
(Monte-Vina, Ascona, Switzerland, 1994).
[12] S. K. Langford and M. E. Hellman. Differential-linear cryptanalysis. In
Advances in Cryptology - Crypto
'94,
(ed. Yvo Desmedt), pp. 17-25. Lecture Notes in Computer Science, Vol. 839. (Springer-Verlag, Berlin,
1994).
[13] R. C. Merkle. Fast software encryption functions. In
Advances in Cryptology - Crypto '90,
(eds. Alfred J.
Menezes and Scott A. Vanstone), pp. 476-501. Lecture Notes in Computer Science, Vol. 537. (Springer-Verlag,
Berlin, 1990).
[14] Shiho Moriai and Yiqun Lisa Yin.
Cryptanalysis of Twofish (II);
http://www.schneier.com/
[15] K. Nyberg and L. R. Knudsen. Provable security against differential cryptanalysis. In
Advances in Crypto-
logy - Crypto '92,
(ed. Ernest F. Brickell), pp. 566-574. Lecture Notes in Computer Science, Vol. 740.
(Springer-Verlag, Berlin, 1992).
[16] Bruce Schneier.
Twofish Cryptanalysis Rumors.
(2005);
http://www.schneier.com/blog/
[17] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.
The Twofish
Encryption Algorithm: A 128-Bit Block Cipher.
(John Wiley, New York, 1999).
[18] S. Vaudenay. Provable security for block ciphers by decorrelation. In
STACS 98: 15th Annual Symposium
on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings,
(eds. Michel
Morvan, Christoph Meniel, and Daniel Krob). Lecture Notes in Computer Science, Vol. 1373. (Springer-Verlag,
Berlin, 1998).
[19] U.S. Government.
SKIPJACK and KEA Algorithm Specifications.
(1998).
[20] David Wagner. The boomerang attack. In
Fast Software Encryption: 6th Interntional Workshop, FSE '99,
(ed. Lars R. Knudsen), pp. 156-170. Lecture Notes in Computer Science, Vol. 1636. (Springer-Verlag, Berlin,
1999);