Two practical and provably secure block ciphers: BEAR and LION
- 1 January 1996
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 113-120
- https://doi.org/10.1007/3-540-60865-6_48
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Science and Business Media LLC ,2001
- LFSR-based Hashing and AuthenticationPublished by Springer Science and Business Media LLC ,2001
- A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation GeneratorsPublished by Springer Science and Business Media LLC ,2001
- A software-optimized encryption algorithmLecture Notes in Computer Science, 1994
- Fast block cipher proposalLecture Notes in Computer Science, 1994
- The First Experimental Cryptanalysis of the Data Encryption StandardLecture Notes in Computer Science, 1994
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Science and Business Media LLC ,1993
- Message authentication with one-way hash functionsACM SIGCOMM Computer Communication Review, 1992
- SOLVING A CLASS OF STREAM CIPHERSCryptologia, 1990
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988