Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Adams CM (1997) Constructing symmetric ciphers using the CAST design procedure. Des Codes Cryptogr 12(3):283–316
Adams CM, Tavares SE (1993) Designing S-boxes for ciphers resistant to differential cryptanalysis. In: Wolfowicz W (ed) Proceedings of the 3rd symposium on state and progress of research in cryptography. Fondazione Ugo Bordoni, pp 181–190
Kelsey J, Schneier B, Wagner D (1997) Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han Y, Okamoto T, Qing S (eds) International conference on information and communications security, ICICS’97. Lecture notes in computer science, vol 1334. Springer-Verlag, Berlin, pp 233–246
Moriai S, Shimoyama T, Kaneko T (1998) Higher order differential attack of CAST cipher. In: Vaudenay S (ed) Fast software encryption, FSE’98. Lecture notes in computer science, vol 1372. Springer-Verlag, Berlin, pp 17–31
Rijmen V, Preneel B, De Win E (1997) On weaknesses of non-surjective round functions. Des Codes Cryptogr 12(3):253–266
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Cannière, C.D. (2011). Cast. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_554
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_554
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering