Author:
Zou Jian,Huang Kairong,Zhu Min,Zou Hongkai,Luo Yiyuan,Liu Qian
Funder
National Natural Science Foundation of China
Science Foundation of the Fujian Province
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Matsui, M.: New block encryption algorithm MISTY. In Biham, E. (ed.), Fast Software Encryption, 4th International Workshop, FSE ’97, Haifa, Israel, January 20–22, 1997, Proceedings, vol. 1267, pp. 54–68. Springer (1997)
2. Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)
3. Nyberg, K.: Generalized feistel networks. In Kim, K., Matsumoto, T. (eds Advances in Cryptology - ASIACRYPT ’96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3–7, 1996, Proceedings, vol. 1163, pp. 91–104. Springer (1996)
4. Coppersmith, Don: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
5. Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms - design and analysis. In Stinson, D.R., Tavares, S.E. (eds.) Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14–15, 2000, Proceedings, vol. 2012, pp. 39–56. Springer (2000)