Papers in the Category "Twofish"

J. Kelsey, Key Separation in Twofish, Twofish Technical Report #7, April 7, 2000.

N. Ferguson, J. Kelsey, B. Schneier, and D. Whiting, A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish, Twofish Technical Report #6, February 14, 2000.

N. Ferguson, Impossible Differentials in Twofish, Twofish Technical Report #5, October 5, 1999.

D. Whiting, J. Kelsey, B. Schneier, D. Wagner, N. Ferguson, and C. Hall, Further Observations on the Key Schedule of Twofish, Twofish Technical Report #4, March 16, 1999.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, New Results on the Twofish Encryption Algorithm, Second AES Candiate Conference, April 1999.

B. Schneier, The Twofish Encryption Algorithm, Dr. Dobb's Journal, December 1998.

D. Whiting, B. Schneier, Improved Twofish Implementations, Twofish Technical Report #3, December 2, 1998.

D. Whiting, D. Wagner, Empirical Verification of Twofish Key Uniqueness Properties, Twofish Technical Report #2, September 22, 1998.

N. Ferguson, Upper Bounds on Differential Characteristics in Twofish, Twofish Technical Report #1, August 17, 1998.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, On the Twofish Key Schedule, Fifth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, August 1998, pp. 27-42.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, Twofish: A 128-Bit Block Cipher, June 15, 1998.

Sidebar photo of Bruce Schneier by Joe MacInnis.