Chapter PDF
References
R. J. Anderson, editor. Fast Software Encryption, number 809 in Lecture Notes in Computer Science. Springer-Verlag, December 1993.
B. Chambers. Two stream ciphers. In Anderson [1], pages 51–55.
CWI, Amsterdam. RIPE Integrity Primitives — Final Report of RACE Integrity Primitives Evaluation (R1040), June 1992.
J. Daemen, R. Govaerts, and J. Vandewalle. A new approach to block cipher design. In Anderson [1], pages 18–32.
B. Kaliski. RFC 1319: The MD2 Message-Digest Algorithm, April 1992.
B. Kaliski and M. Robshaw. Fast block cipher proposal. In Anderson [1], pages 33–40.
J. L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In Anderson [1], pages 1–17.
C. H. Meyer and S. M. Matyas. Cryptography: a new dimension in computer data security. John Wiley and Sons, 1982.
National Bureau of Standards. Federal Information Processing Standard — Publication 46: Data Encryption Standard, 1977.
National Institute of Standards and Technology. Federal Information Processing Standard — Publication 180-1: Secure Hash Standard, May 1994.
National Institute of Standards and Technology. NIST announces technical correction to secure hash standard. Press release, April 1994.
R. L. Rivest. RFC 1320: The MD4 Message-Digest Algorithm, April 1992.
R. L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm, April 1992.
R. L. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, Lecture Notes in Computer Science. Springer-Verlag, pages 86–96 (these proceedings).
M. Roe. Performance of symmetric ciphers and one-way hash functions. In Anderson [1].
P. Rogaway and D. Coppersmith. A software optimised encryption algorithm. In Anderson [1], pages 56–63.
[Russian] State Committee for Standardization, Metrology and Certification. GOST 28147: Cryptographic Protection for Data Processing Systems — Cryptographic Transformation Algorithm, 1990.
B. Schneier. Description of a new variable-length key, 64-bit block cipher (Blow-fish). In Anderson [1], pages 191–204.
B. Schneier. The GOST encryption algorithm. Dr. Dobb's Journal, pages 143–144, January 1995.
D. Wheeler. A bulk data encryption algorithm. In Anderson,[1], pages 127–134.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roe, M. (1995). Performance of block ciphers and hash functions — One year later. In: Preneel, B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol 1008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60590-8_28
Download citation
DOI: https://doi.org/10.1007/3-540-60590-8_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60590-4
Online ISBN: 978-3-540-47809-6
eBook Packages: Springer Book Archive