Author of the publication

On the Twofish Key Schedule.

, , , , and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 27-42. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on Twofish as an AES Candidate., , , , and . AES Candidate Conference, page 355-356. (2000)A Simple Algebraic Representation of Rijndael., , and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 103-111. Springer, (2001)Counter with CBC-MAC (CCM)., , and . RFC, (September 2003)Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor., and . FSE, volume 1267 of Lecture Notes in Computer Science, page 242-259. Springer, (1997)Twofish on Smart Cards., and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 265-276. Springer, (1998)A Performance Comparison of the Five AES Finalists., and . AES Candidate Conference, page 123-135. National Institute of Standards and Technology,, (2000)On the Twofish Key Schedule., , , , and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 27-42. Springer, (1998)