On the SAFER cryptosystem
An abstraction and some desirable properties of the PHT layer as defined in SAFER are identified. These properties lead to the construction of 3071 other structures which could be used as alternative PHT layers. Results of preliminary investigations carried out on these structures to ascertain their suitability as alternatives are briefly discussed, together with other possible uses and open problems.
- Lars R. Knudsen: A key-schedule weakness in SAFER K-64. D. Coppersmith editor, Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science, 963 (1995) 274–286.
- Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. D. Gollman editor, Fast Software Encryption, Lecture Notes in Computer Science, 1039 (1996) 15–26.
- Massey, J.L. (1994) SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. Fast Software Encryption. Lecture Notes in Computer Science 809: pp. 1-17
- J.L. Massey: SAFER K-64: One Year Later. B. Preneel editor, Fast Software Encryption, Lecture Notes in Computer Science, 1008 (1995) 212–241.
- J.L. Massey: Announcement of 40-bit key scedule for SAFER. E-mail announcement by author, 22 October 1995.
- Sean Murphy: An Analysis of SAFER. Journal of Cryptology (to appear).
- Shannon, C.E. (1949) Communication theory of secrecy systems. Bell Systems Tech. Jul. 28: pp. 656-715
- Vaudenay, S. (1995) On the need for Multipermutations: Cryptanalysis of MD4 and SAFER. Fast Software Encryption. Lecture Notes in Computer Science 1008: pp. 286-297
- On the SAFER cryptosystem
- Book Title
- Crytography and Coding
- Book Subtitle
- 6th IMA International Conference Cirencester, UK, December 17–19, 1997 Proceedings
- pp 59-68
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.