Twofish

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish. Twofish’s distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex key schedule. One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES. .. (wikipedia)


References in zbMATH (referenced in 35 articles )

Showing results 1 to 20 of 35.
Sorted by year (citations)

1 2 next

  1. Rishakani, Akbar Mahmoodi; Dehnavi, Seyed Mojtaba; Shamsabad, Mohmmadreza Mirzaee; Bagheri, Nasour: Cryptographic properties of cyclic binary matrices (2021)
  2. Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba; Mahmoodi Rishakani, Akbar: Randomized nonlinear software-oriented MDS diffusion layers (2019)
  3. Chand Gupta, Kishan; Kumar Pandey, Sumit; Ghosh Ray, Indranil: Applications of design theory for the constructions of MDS matrices for lightweight cryptography (2017)
  4. Chen, Huaifeng; Cui, Tingting; Wang, Meiqin: Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using (\chi^2)-method (2016)
  5. Castiglione, Arcangelo; Palmieri, Francesco; Fiore, Ugo; Castiglione, Aniello; De Santis, Alfredo: Modeling energy-efficient secure communications in multi-mode wireless mobile devices (2015)
  6. Doğanaksoy, Ali; Sulak, Fatih; Uğuz, Muhiddin; Şeker, Okan; Akcengiz, Ziya: New statistical randomness tests based on length of runs (2015)
  7. Gupta, Kishan; Ray, Indranil: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (2015)
  8. Shibutani, Kyoji; Bogdanov, Andrey: Towards the optimality of Feistel ciphers with substitution-permutation functions (2014)
  9. Tezcan, Cihangir: Improbable differential attacks on \textttPRESENTusing undisturbed bits (2014)
  10. Wu, Yue; Zhou, Yicong; Noonan, Joseph P.; Agaian, Sos: Design of image cipher using Latin squares (2014)
  11. Ali, Sk Subidh; Mukhopadhyay, Debdeep: Differential fault analysis of Twofish (2013)
  12. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)
  13. Bose, Utsab; Bhattacharya, Anup Kumar; Das, Abhijit: GPU-based implementation of 128-bit secure eta pairing over a binary field (2013)
  14. Chand Gupta, Kishan; Ghosh Ray, Indranil: On constructions of involutory MDS matrices (2013)
  15. Tang, Ming; Qiu, Zhenlong; Yang, Min; Cheng, Pingpan; Gao, Si; Liu, Shubo; Meng, Qinshu: Evolutionary ciphers against differential power analysis and differential fault analysis (2012)
  16. Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik: Differential cryptanalysis of round-reduced printcipher: computing roots of permutations (2011)
  17. Biryukov, Alex; Nikolić, Ivica: Search for related-key differential characteristics in DES-like ciphers (2011)
  18. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Cryptanalysis of PRESENT-like ciphers with secret S-boxes (2011)
  19. Mouha, Nicky; Velichkov, Vesselin; De Cannière, Christophe; Preneel, Bart: The differential analysis of S-functions (2011)
  20. Tapia Recillas, Horacio: On some applications of Galois fields (2011)

1 2 next