Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish. Twofish’s distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex key schedule. One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES. .. (wikipedia)
Keywords for this software
References in zbMATH (referenced in 24 articles )
Showing results 1 to 20 of 24.
Sorted by year (- Chen, Huaifeng; Cui, Tingting; Wang, Meiqin: Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using $\chi^2$-method (2016)
- Castiglione, Arcangelo; Palmieri, Francesco; Fiore, Ugo; Castiglione, Aniello; De Santis, Alfredo: Modeling energy-efficient secure communications in multi-mode wireless mobile devices (2015)
- Gupta, Kishan; Ray, Indranil: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (2015)
- Shibutani, Kyoji; Bogdanov, Andrey: Towards the optimality of Feistel ciphers with substitution-permutation functions (2014)
- Wu, Yue; Zhou, Yicong; Noonan, Joseph P.; Agaian, Sos: Design of image cipher using Latin squares (2014)
- Ali, Sk Subidh; Mukhopadhyay, Debdeep: Differential fault analysis of Twofish (2013)
- Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)
- Bose, Utsab; Bhattacharya, Anup Kumar; Das, Abhijit: GPU-based implementation of 128-bit secure eta pairing over a binary field (2013)
- Chand Gupta, Kishan; Ghosh Ray, Indranil: On constructions of involutory MDS matrices (2013)
- Tang, Ming; Qiu, Zhenlong; Yang, Min; Cheng, Pingpan; Gao, Si; Liu, Shubo; Meng, Qinshu: Evolutionary ciphers against differential power analysis and differential fault analysis (2012)
- Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport
- Piret, Gilles: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (2006)
- Shirai, Taizo; Shibutani, Kyoji: On Feistel structures using a diffusion switching mechanism (2006)
- Englund, Håkan; Johansson, Thomas: A new simple technique to attack filter generators and related ciphers (2005)
- Shirai, Taizo; Preneel, Bart: On Feistel ciphers using optimal diffusion mappings across multiple rounds (2004)
- Lucks, Stefan: The saturation attack -- a bait for Twofish (2002)
- Goubin, Louis: A sound method for switching between Boolean and arithmetic masking (2001)
- Jakimoski, Goce; Kocarev, Ljupčo: Chaos and cryptography: Block encryption ciphers based on chaotic maps (2001)
- Messerges, Thomas S.: Securing the AES finalists against power analysis attacks (2001)
- Biham, Eli; Furman, Vladimir: Improved impossible differentials on Twofish (2000)