Twofish : A 128-bit block cipher
Citations
3,444 citations
2,188 citations
638 citations
Cites methods from "Twofish : A 128-bit block cipher"
...In Section V we discuss different ways of using chaos based ciphers, and we close our paper with conclusion in Section VI....
[...]
388 citations
Cites background from "Twofish : A 128-bit block cipher"
...Twofish [83] is a Feistel network with 16 rounds....
[...]
...The Twofish specification [83] also reports attacks on reduced-round variants of Twofish that are considerably simplified in other ways: for example, by using fixed S-boxes, by removing whitening or subkeys, or by allowing partial key guesses....
[...]
369 citations
Cites background or methods from "Twofish : A 128-bit block cipher"
...The field of candidates for the final round of the Advanced Encryption Standard (AES) selection process has been narrowed from fifteen down to five finalists: Mars [1], RC6 [2], Rijndael [3], Serpent [4], and Twofish [ 5 ]....
[...]
...More efficient implementations have been described that use key dependent tables [ 5 ], but these implementations are not suitable for low-memory smartcards....
[...]
References
14,980 citations
14,659 citations
10,083 citations
7,514 citations
3,989 citations