期刊文献+

高级加密标准AES候选之一——Twofish 被引量:1

Twofish-Candidate of Advanced Encryption Standard
原文传递
导出
摘要 介绍了AES的一个候选算法——Twofish,它是一个128位分组加密算法。该密码由一个16圈的Feistel网络构成。描述了Twofish的加解密过程及子密钥生成过程,同时对其性能和抗攻击能力作了分析。 This article introduces a candidate for AES-Twofish. Twofish is a 128 -bit block cipher. It consists of a 16 - round Feistel network. This article describes the process of encrypting data and generating the subkeys. It also introduces the performance of Twofish and the capacity of resisting attack of Twofish.
出处 《信息安全与通信保密》 2000年第2期53-58,69,共7页 Information Security and Communications Privacy
基金 国家自然科学基金(批准号69973034) 湖北省自然科学基金(批准号99J03D) 西安电子科技大学ISDN国家重点实验室的资助
关键词 高级加密标准 AES 抗攻击能力 密码 密钥 分组加密算法 加解密 网络构成 性能 描述 cryptography , block cipher, cryptanalysis. AES
  • 相关文献

参考文献1

  • 1[1]Schneier B,Kelsey J,Whiting D,et al. Twofish:A128-bit block cipher.http://www.counterpane,com/twofish.html

同被引文献17

  • 1崔竞松,张焕国.高级加密标准AES候选之一——MARS算法[J].信息安全与通信保密,2000,22(2):59-66. 被引量:2
  • 2潘国振,王界兵,严晓浪.高性能嵌入式CPU特殊指令单元的设计与实现[J].浙江大学学报(工学版),2005,39(2):211-215. 被引量:3
  • 3卢开澄.计算机密码学[M].北京:清华大学出版社,1998..
  • 4蔡皖东.网络信息安全[M].西安:西北工业大学出版社,2004.
  • 5BARTOLINI S, BRANOVIC I, GIORGI R, et al. A performance evaluation of ARM ISA extension for elliptic curve cryptography over binary finite fields [ C ] //Proc of 16th Symposium on Computer Architecture and High Performance Computing. Washington DC: IEEE CS Press, 2004.
  • 6GROBSHADL J, IENNE P, POZZI L, et al. Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography[ C] //Proc of the 9th Conference on Design, Automation and Test in Europe. Washington DC: IEEE CS Press, 2006.
  • 7GROBSCHADL J, KAMENDJE G A. Instruction set extension for fast elliptic curve cryptography over binary finite fields GF ( 2^m ) [ C ] // Proc of the 14th Conference on Application-specific Systems, Architectures and Processors. Washington DC: IEEE CS Press,IEEE Computer Society Press, 2003.
  • 8KUMAR S, PAAR C. Reconfigurable instruction set extension for enabling ECC on an 8-bit processor[ C ] //Proc of the 14th International Conference Field Programmable Logic and Application. Berlin: Springer-Verlag, 2004.
  • 9TILLICH S, GROBSCHADL J. Accelerating AES using instruction set extensions for elliptic curve cryptography [ J ]. Computational Science and Its Applications, 2005, 3481 : 665-675.
  • 10TILLICH S, GROBSCHADL J, SZEKELY A. An instruction set extension for fast and memory-efficient AES implementation[ J ]. Communications and Multimedia Security, 2005, 3677: 1-21.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部