In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish. Twofish’s distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex key schedule. One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES. .. (wikipedia)

References in zbMATH (referenced in 30 articles )

Showing results 1 to 20 of 30.
Sorted by year (citations)

1 2 next

  1. Chand Gupta, Kishan; Kumar Pandey, Sumit; Ghosh Ray, Indranil: Applications of design theory for the constructions of MDS matrices for lightweight cryptography (2017)
  2. Chen, Huaifeng; Cui, Tingting; Wang, Meiqin: Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using $\chi^2$-method (2016)
  3. Castiglione, Arcangelo; Palmieri, Francesco; Fiore, Ugo; Castiglione, Aniello; De Santis, Alfredo: Modeling energy-efficient secure communications in multi-mode wireless mobile devices (2015)
  4. Gupta, Kishan; Ray, Indranil: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (2015)
  5. Shibutani, Kyoji; Bogdanov, Andrey: Towards the optimality of Feistel ciphers with substitution-permutation functions (2014)
  6. Wu, Yue; Zhou, Yicong; Noonan, Joseph P.; Agaian, Sos: Design of image cipher using Latin squares (2014)
  7. Ali, Sk Subidh; Mukhopadhyay, Debdeep: Differential fault analysis of Twofish (2013)
  8. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)
  9. Bose, Utsab; Bhattacharya, Anup Kumar; Das, Abhijit: GPU-based implementation of 128-bit secure eta pairing over a binary field (2013)
  10. Chand Gupta, Kishan; Ghosh Ray, Indranil: On constructions of involutory MDS matrices (2013)
  11. Tang, Ming; Qiu, Zhenlong; Yang, Min; Cheng, Pingpan; Gao, Si; Liu, Shubo; Meng, Qinshu: Evolutionary ciphers against differential power analysis and differential fault analysis (2012)
  12. Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik: Differential cryptanalysis of round-reduced printcipher: computing roots of permutations (2011)
  13. Biryukov, Alex; Nikolić, Ivica: Search for related-key differential characteristics in DES-like ciphers (2011)
  14. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Cryptanalysis of PRESENT-like ciphers with secret S-boxes (2011)
  15. Mouha, Nicky; Velichkov, Vesselin; De Cannière, Christophe; Preneel, Bart: The differential analysis of S-functions (2011)
  16. Michiels, Wil; Gorissen, Paul; Hollmann, Henk D.L.: Cryptanalysis of a generic class of white-box implementations (2009)
  17. Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport
  18. Piret, Gilles: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (2006)
  19. Shirai, Taizo; Shibutani, Kyoji: On Feistel structures using a diffusion switching mechanism (2006)
  20. Englund, Håkan; Johansson, Thomas: A new simple technique to attack filter generators and related ciphers (2005)

1 2 next