Rivest, "The RC5 Encryption Algorithm", Dr. Dobbs Journal, pp. 146 and 148, Jan. 1995. |
D.J. Wheeler, A Bulk Data Encryption Algorithm, Fast Software Encryption (Ed.R. Anderson), Lecture Notes in Computer Science, Spring-Verlag 809:127-134, 1994. |
R.J. Anderson and E. Biham, Tiger: A Fast New Hash Function, Fast Software Encryption (Ed D. Gollmann), Lecture Notes in Computer Science, Springer-Verlag, 1039:89-97, 1996. |
J. Daemen et al., Resynchronization Weaknesses in Synchronous Stream Ciphers, Advances in Cryptology--Eurocrypt '93 Proceedings, Springer-Verlag, 159-167, 1994. |
ISO/IEC 10166, Information Technology, Modes of operation for an n-bit block ciper algorithm, International Organization for Standardization / International Electrotechnical Commission, 1991. |
R.J. Jenkins, ISAAC, Fst Software Encryption (Ed. D. Gollmann), LNCS, Springer-Verlag, 1039:41-49, 1996. |
B.S. Kaliski and M.J.B. Robshaw, Fast Block Cipher Proposal, Fast Software Encryption (Ed. R. Anderson), Springer-Verlag, 809: 33-40, 1994. |
NBS FIPS PUB 46-1, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan. 1988. |
NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Apr., 1995. |
P. Rogaway and D. Coppersmith, A software-Optimized Encryption Agorithm, Fast Software Encryption (Ed.R. Anderson), LNCS, Springer-Verlag, 809:56-63, 1994. |
B.Schneier, Applied Cryptography, Second Ecition, John Wiley & Sons, 397-398, 1996. |
B.Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption (Ed. R. Anderson), LNCS sprinter-Verlag, 809;191-204, 1994. |
R.L. Rivest, The RC5 Encryption Algorithm, Dr. Dobb's Journal, Jan. 1995, pp. 146 and 148. |