Skip to main content
  • 84 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Biryukov, A. and E. Kushilevitz (1998). “Improved cryptanalysis of RC5.” Advances in Cryptology—EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, ed. K. Nyberg. Springer-Verlag, Berlin, 85–99.

    Google Scholar 

  2. Borst, J., B. Preneel, and J. Vandewalle (1999). “Linear cryptanalysis of RC5 and RC6.” Fast Software Encryption—Sixth International Workshop, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 16–30.

    Google Scholar 

  3. Kaliski B.S. and Y.L. Yin (1995). “On differential and linear cryptanalysis of the RC5 encryption algorithm.” Advances in Cryptology—CRYPTO'95, Lecture Notes in Computer Science, vol. 963, ed. D. Coppersmith. Springer-Verlag, Berlin, 171–184.

    Google Scholar 

  4. Knudsen, L.R. and W. Meier (1996). “Improved differential attacks on RC5.” Advances in Cryptology—CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, ed. N. Koblitz. Springer-Verlag, Berlin, 216–228.

    Google Scholar 

  5. Rivest, R. (1995). “The RC5 encryption algorithm.” Fast Software Encryption—Second International Workshop, Lecture Notes in Computer Science, vol. 1008, ed. B. Preneel. Springer-Verlag, Berlin, 86–96.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Handschuh, H. (2005). RC5. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_345

Download citation

Publish with us

Policies and ethics