Biryukov, Alex et al., “Improved Cryptanalysis of RC5,” 8 pages presented at Eurocrypt '98, May 31-Jun. 4, 1998, http://www.cs.technion.ac.il/˜eyalk/pub.html. |
Kaliski, Jr., B. et al., “On Differential and Linear Cryptanalysis of RC5 Encryption Algorithm,” pp. 171-184, in D. Coppersmith ed., Advances in Cryptology—CRYPTO '95, LNCS No. 963, 1995. |
Knudsen, L. et al., “Improved Differential Attacks of RC5,” pp. 216-228, presented at CRYPTO '96, Aug. 18-22, 1996, http://www.cs.technion.ac.il/˜/pub.html. |
Madryga, W.E., “A High Performance Encryption Algorithm,” in J. H. Finch and E.G. Dougall eds., Computer Security: A Global Challenge, pp. 557-570, 1984. |
Matsui, Mitsuru, “Linear Cryptanalysis Method for DES Cipher,” in T. Helleseth ed., Advances in Cryptology—Eurocrypt '93, pp. 386-396, 1994. |
Rivest, Ronald, “The RC5 Encryption Algorithm,” Dr. Dobb's Journal, Jan. 1995, pp. 146-148. |
Rivest, Ronald, “The RC5 Encryption Algorithm,” 11 pages, in Fast Software Encryption, Second International Workshop, pp. 86-96, 1995. |
Rivest, Ronald, et al., “The RC6™ Block Cipher,” pp. 1-20, http://theory.lcs.mit.edu/˜rivest/publications.html, downloaded Jun. 19, 1998. |
Rivest, Ronald, “Further Notes on RC6, Last updated Jun. 20, 1998,” 1 page http://theory.lcs.mit.edu/˜rivest/publications.html, downloaded Sep. 25, 1998. |
Selcuk, Ali Aydin, “New Results in Linear Cryptanalysis of RC5,” pp. 1-16, Fast Software Encryption Conference, Paris, Mar. 1998. |
Schneier, Bruce, “Applied Cryptography, Protocols, Algorithms, and Source Code in C,” John Wiley & Sons, Inc., 1994, pp. 154-185; 219-272. |