Part of the Lecture Notes in Computer Science book series (LNCS, volume 1008)
TEA, a tiny encryption algorithm
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
- 1.National Institute of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46. January 1977Google Scholar
- 2.E. Biham and A. Shamir, Differential Analysis of the Data Encryption Standard, Springer-Verlag, 1993Google Scholar
- 3.B. Schneier, Applied Cryptology, John Wiley & sons, New York 1994.Google Scholar
© Springer-Verlag 1995