Abstract
By using a large number of round, we hope to be able to scrounge an Sbox out of nowhere, in an environment for which even TEA and the SAFERs are gross overdesign.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Hersch, Russ: 8051 Microcontroller FAQ, widely available on the Internet
Preneel, B. and van Oorschott, P., MDx-MAC and Building Fast Macs from Hash Functions, Crypto’95, p.1.
Bellare, M. Canetti, R. and Krawcyzk, H., Keying Hash Functions for Message Authentication, Crypto’96, p.1
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Yuval, G. (1997). Reinventing the travois: Encryption/MAC in 30 ROM bytes. In: Biham, E. (eds) Fast Software Encryption. FSE 1997. Lecture Notes in Computer Science, vol 1267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052347
Download citation
DOI: https://doi.org/10.1007/BFb0052347
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63247-4
Online ISBN: 978-3-540-69243-0
eBook Packages: Springer Book Archive