A fast software one-way hash function
Journal of Cryptology
On the security of multiple encryption
Communications of the ACM
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
On the distribution of characteristics in bijective mappings
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Resistance of a CAST-Like Encryption Algorithm to Linearand Differential Cryptanalysis
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Designing encryption algorithms for real people
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Key-Dependent S-Boxes and Differential Cryptanalysis
Designs, Codes and Cryptography
Key-Schedule Cryptanalysis of DEAL
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Content-Addressable Search Engines and DES-like Systems
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Distribution of Characteristics in Composite Permutations
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A linear analysis of Blowfish and Khufu
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
SCOB, a soft-core for the blowfish cryptographic algorithm
SBCCI'99 Proceedings of the XIIth conference on Integrated circuits and systems design
Differential cryptanalysis of round-reduced PRINTCIPHER: computing roots of permutations
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Hi-index | 0.00 |
Encryption hardware is not available on most computer systems in use today. Despite this fact, there is no well accepted encryption function designed for software implementation - - instead, hardware designs are emulated in software and the resulting performance loss is tolerated. The obvious solution is to design an encryption function for implementation in software. Such an encryption function is presented here - on a SUN 4/260 it can encrypt at 4 to 8 megabits per second. The combination of modern processor speeds and a faster algorithm make software encryption feasible in applications which previously would have required hardware. This will effectively reduce the cost and increase the availability of cryptographic protection.