Blackburn, S., Murphy, S., Piper, F., Wild, P.: A SOBERing remark. Unpublished technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K (1998)
Google Scholar
Bleichenbacher, D., Patel, S.: SOBER cryptanalysis. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 305–316. Springer, Heidelberg (1999)
CrossRef
Google Scholar
Bleichenbacher, D., Patel, S., Meier, W.: Analysis of the SOBER stream cipher. TIA Contribution TR45.AHAG/99.08.30.12
Google Scholar
Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers using Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Courtois, N.T.: Higher Order Correlatoin Attacks, XL algorithm and Cryptanalysis of Toyocrypt. Cryptology ePrint Archive, International Association for Cryptological Research (IACR), document 2002/087 (2002), See
http://eprint.iacr.org
Daemen, J., Rijmen, V.: AES Proposal: Rijndael (2000), See
http://www.esat.kuleuven.ac.be/~rijmen/rijndael
Dawson, E., Clark, A., Gustafson, H., May, L.: CRYPT-X 1998 (Java Version) User Manual. Queensland University of Technology (1999)
Google Scholar
Dawson, E., Millan, W., Burnett, L., Carter, G.: On the Design of 8*32 S-boxes. Unpublished report, by the Information Systems Research Centre, Queensland University of Technology (1999)
Google Scholar
Ekdahl, P., Johansson, T.: SNOW - a new stream cipher (2000), This paper is found in the NESSIE webpages:
http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/snow.zip
Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)
Google Scholar
Hall, C., Schneier, B.: An Analysis of SOBER (1999) (Unpublished report)
Google Scholar
Hawkes, P., Rose, G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 302–316. Springer, Heidelberg (2000)
CrossRef
Google Scholar
Hawkes, P., Rose, G.: The t-class of SOBER stream ciphers (2000), See:
http://people.qualcomm.com/ggr/QC/tclass.pdf
Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE (2000), See:
http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/sobert32.zip
Herlestam, T.: On functions of Linear Shift Register Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 119–129. Springer, Heidelberg (1986)
CrossRef
Google Scholar
Massey, J.L.: SAFER K-64: A Byte-oriented Block-Ciphering Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809. Springer, Heidelberg (1994)
Google Scholar
Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) (September 2000), See:
http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/safer++.zip
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. ch. 6. CRC Press, Boca Raton (1997)
MATH
Google Scholar
The NESSIE Project New European Schemes for Signatures, Integrity, and Encryption (2000-2003), See:
http://www.cryptonessie.org
Paar, C.: Efficieint VLSI Architectures for Bit-Parallel Computation in Galois Fields. Ph.D. Thesis, Institute for Experimental Mathematics, University of Essen (1994) ISBN 3-18-332810-0
Google Scholar
Rose, G.: A stream cipher based on Linear Feedback over GF(28). In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 146–155. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Rose, G.: Reference Source Code for Turing. QUALCOMM Australia (2002), See:
http://people.qualcomm.com/ggr/QC/Turing.tgz
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. See:
http://www.counterpane.com/twofish.html
St, T.: Denis. Weekend Cipher. sci.crypt news article: 3d4d614d_17@news.teranews.com
Google Scholar