Reinventing the travois: Encryption/MAC in 30 ROM bytes

  • Gideon Yuval
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1267)


By using a large number of round, we hope to be able to scrounge an Sbox out of nowhere, in an environment for which even TEA and the SAFERs are gross overdesign.


Hash Function Block Cipher Garage Door Feedforward Mode Message Amount 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Hersch, Russ: 8051 Microcontroller FAQ, widely available on the InternetGoogle Scholar
  2. 2.
    Preneel, B. and van Oorschott, P., MDx-MAC and Building Fast Macs from Hash Functions, Crypto’95, p.1.Google Scholar
  3. 3.
    Bellare, M. Canetti, R. and Krawcyzk, H., Keying Hash Functions for Message Authentication, Crypto’96, p.1Google Scholar

Copyright information

© Springer-Verlag 1997

Authors and Affiliations

  • Gideon Yuval
    • 1
  1. 1.Microsoft ResearchRedmondUSA

Personalised recommendations