In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish. Twofish’s distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex key schedule. One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES. .. (wikipedia)

References in zbMATH (referenced in 35 articles )

Showing results 21 to 35 of 35.
Sorted by year (citations)
  1. Michiels, Wil; Gorissen, Paul; Hollmann, Henk D. L.: Cryptanalysis of a generic class of white-box implementations (2009)
  2. Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport
  3. Piret, Gilles: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (2006)
  4. Shirai, Taizo; Shibutani, Kyoji: On Feistel structures using a diffusion switching mechanism (2006)
  5. Englund, Håkan; Johansson, Thomas: A new simple technique to attack filter generators and related ciphers (2005)
  6. Shirai, Taizo; Preneel, Bart: On Feistel ciphers using optimal diffusion mappings across multiple rounds (2004)
  7. Lucks, Stefan: The saturation attack -- a bait for Twofish (2002)
  8. Goubin, Louis: A sound method for switching between Boolean and arithmetic masking (2001)
  9. Jakimoski, Goce; Kocarev, Ljupčo: Chaos and cryptography: Block encryption ciphers based on chaotic maps (2001)
  10. Messerges, Thomas S.: Securing the AES finalists against power analysis attacks (2001)
  11. Biham, Eli; Furman, Vladimir: Improved impossible differentials on Twofish (2000)
  12. Coron, Jean-Sébastien; Goubin, Louis: On Boolean and arithmetic masking against differential power analysis (2000)
  13. Dandalis, Andreas; Prasanna, Viktor K.; Rolim, Jose D. P.: A comparative study of performance of AES final candidates using FPGAs (2000)
  14. Lipmaa, Helger: IDEA: A cipher for multimedia architectures? (1999)
  15. Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels: On the twofish key schedule (1999)