Advertisement

Performance of block ciphers and hash functions — One year later

  • Michael Roe
Session 8: Recent Results
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1008)

References

  1. 1.
    R. J. Anderson, editor. Fast Software Encryption, number 809 in Lecture Notes in Computer Science. Springer-Verlag, December 1993.Google Scholar
  2. 2.
    B. Chambers. Two stream ciphers. In Anderson [1], pages 51–55.Google Scholar
  3. 3.
    CWI, Amsterdam. RIPE Integrity Primitives — Final Report of RACE Integrity Primitives Evaluation (R1040), June 1992.Google Scholar
  4. 4.
    J. Daemen, R. Govaerts, and J. Vandewalle. A new approach to block cipher design. In Anderson [1], pages 18–32.Google Scholar
  5. 5.
    B. Kaliski. RFC 1319: The MD2 Message-Digest Algorithm, April 1992.Google Scholar
  6. 6.
    B. Kaliski and M. Robshaw. Fast block cipher proposal. In Anderson [1], pages 33–40.Google Scholar
  7. 7.
    J. L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In Anderson [1], pages 1–17.Google Scholar
  8. 8.
    C. H. Meyer and S. M. Matyas. Cryptography: a new dimension in computer data security. John Wiley and Sons, 1982.Google Scholar
  9. 9.
    National Bureau of Standards. Federal Information Processing Standard — Publication 46: Data Encryption Standard, 1977.Google Scholar
  10. 10.
    National Institute of Standards and Technology. Federal Information Processing Standard — Publication 180-1: Secure Hash Standard, May 1994.Google Scholar
  11. 11.
    National Institute of Standards and Technology. NIST announces technical correction to secure hash standard. Press release, April 1994.Google Scholar
  12. 12.
    R. L. Rivest. RFC 1320: The MD4 Message-Digest Algorithm, April 1992.Google Scholar
  13. 13.
    R. L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm, April 1992.Google Scholar
  14. 14.
    R. L. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, Lecture Notes in Computer Science. Springer-Verlag, pages 86–96 (these proceedings).Google Scholar
  15. 15.
    M. Roe. Performance of symmetric ciphers and one-way hash functions. In Anderson [1].Google Scholar
  16. 16.
    P. Rogaway and D. Coppersmith. A software optimised encryption algorithm. In Anderson [1], pages 56–63.Google Scholar
  17. 17.
    [Russian] State Committee for Standardization, Metrology and Certification. GOST 28147: Cryptographic Protection for Data Processing Systems — Cryptographic Transformation Algorithm, 1990.Google Scholar
  18. 18.
    B. Schneier. Description of a new variable-length key, 64-bit block cipher (Blow-fish). In Anderson [1], pages 191–204.Google Scholar
  19. 19.
    B. Schneier. The GOST encryption algorithm. Dr. Dobb's Journal, pages 143–144, January 1995.Google Scholar
  20. 20.
    D. Wheeler. A bulk data encryption algorithm. In Anderson,[1], pages 127–134.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Michael Roe
    • 1
  1. 1.Cambridge University Computer LaboratoryCambridgeUK

Personalised recommendations