Fast block cipher proposal

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 809)


Hash Function Block Cipher Round Function Encryption Rate Large Block Size 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993.Google Scholar
  2. 2.
    B. den Boer and A. Bosselaers. Collisions for the compression function of MD5. In Advances in Cryptology — Eurocrypt '93, 1993. To appear.Google Scholar
  3. 3.
    D.E. Knuth. The Art of Computer Programming. Volume 2, Addison-Wesley, Reading, Mass., 2nd edition, 1981.Google Scholar
  4. 4.
    M. Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptology — Eurocrypt '93, 1993. To appear.Google Scholar
  5. 5.
    U.M. Maurer and J.L. Massey. Cascade ciphers: the importance of being first. In Proc. IEEE Symposium on Information Theory, 1990. January 14–19, San Diego, CA.Google Scholar
  6. 6.
    National Institute of Standards and Technology (NIST). FIPS Publication 180: Secure Hash Standard (SHS). May 11, 1993.Google Scholar
  7. 7.
    National Institute of Standards and Technology (NIST). FIPS Publication 46-1: Data Encryption Standard. January 22, 1988. Originally issued by National Bureau of Standards.Google Scholar
  8. 8.
    A.V. Oppenheim and R.W. Schafer. Digital Signal Processing. Prentice-Hall, Inc., New Jersey, 1975.Google Scholar
  9. 9.
    B. Preneel. Analysis and design of cryptographic hash functions. PhD thesis, Katholieke Universiteit Leuven, 1993.Google Scholar
  10. 10.
    R.L Rivest. The MD4 message digest algorithm. In Advances in Cryptology — Crypto '90, pages 303–311, Springer-Verlag, New York, 1991.Google Scholar
  11. 11.
    R.L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board, April 1992.Google Scholar
  12. 12.
    I. Schaumuller-Bichl. On the design and analysis of new cipher systems related to the DES. Technical Report, Linz University, 1983.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  1. 1.RSA LaboratoriesRedwood City

Personalised recommendations