References
Biryukov, A. and E. Kushilevitz (1998). “Improved cryptanalysis of RC5.” Advances in Cryptology—EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, ed. K. Nyberg. Springer-Verlag, Berlin, 85–99.
Borst, J., B. Preneel, and J. Vandewalle (1999). “Linear cryptanalysis of RC5 and RC6.” Fast Software Encryption—Sixth International Workshop, Lecture Notes in Computer Science, vol. 1636, ed. L.R. Knudsen. Springer-Verlag, Berlin, 16–30.
Kaliski B.S. and Y.L. Yin (1995). “On differential and linear cryptanalysis of the RC5 encryption algorithm.” Advances in Cryptology—CRYPTO'95, Lecture Notes in Computer Science, vol. 963, ed. D. Coppersmith. Springer-Verlag, Berlin, 171–184.
Knudsen, L.R. and W. Meier (1996). “Improved differential attacks on RC5.” Advances in Cryptology—CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, ed. N. Koblitz. Springer-Verlag, Berlin, 216–228.
Rivest, R. (1995). “The RC5 encryption algorithm.” Fast Software Encryption—Second International Workshop, Lecture Notes in Computer Science, vol. 1008, ed. B. Preneel. Springer-Verlag, Berlin, 86–96.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Handschuh, H. (2005). RC5. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_345
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_345
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering