References
- Banik, S., A. Bogdanov, and F. Regazzoni. 2016. Atomic-AES: A compact implementation of the AES encryption/decryption core. https://eprint.iacr.org/2016/927.pdf.
- Coppersmith, D. 1994. The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development 38 (3):243–50. doi:10.1147/rd.383.0243.
- Courtois, N., T. Mourouzis, M. Misztal, J.-J. Quisquater, and G. Song. 2015. Can GOST be made secure against differential cryptanalysis? Cryptologia 39 (2):145–56.
- Drobick, J. 2017a. Der angewandte und geplante Einsatz des DES Verfahrens, eigene Entwicklung von Blockchiffrierverfahren. http://scz.bplaced.net/des.html.
- Drobick, J. 2017b. Analyseergebnisse des Chiffrieralgorithmus ARGON. http://scz.bplaced.net/ke-sks-t310.html.
- Feistel, H. 1973. Cryptography and computer privacy. Scientific American 228 (5):15–23.
- Ferguson, N., S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, and J. Walker. 2010. The skein hash function family. http://www.skein-hash.info/sites/default/files/skein1.3.pdf.
- Kilian, J., and P. Rogaway. 2000. How to protect DES against exhaustive key search. http://web.cs.ucdavis.edu/∼rogaway/papers/desx.pdf.
- Levy, S. 2001. Crypto: How the code rebels beat the government—Saving privacy in the digital age, 55–56. London: Penguin Books.
- Massey, J., and X. Lai. 1990. A proposal for a new block encryption standard. In Advances in Cryptology—EUROCRYPT’90, ed. I. B. Damgård, 389–404.
- MfS-Abt-XI-183. 1973. Document MfS-Abt-XI-183 [SKS V/1 Specification]. Berlin: Zentrales Chiffrierorgan.
- MfS-Abt-XI-532. 1976. Document MfS-Abt-XI-532 [Sachstandsbericht]. Berlin: Zentrales Chiffrierorgan.
- Paar, C., et al. 2007. Present: An ultra-lightweight block cipher. http://lightweightcrypto.org/present/present_ches2007.pdf.
- Poschmann, A., S. Ling, and H. Wang. 2010. 256 bit standardized crypto for 650 GE GOST revisited. In CHES 2010, ed. S. Mangard, and F.-X. Standaert, 219–33. Berlin Heidelberg: Springer.
- Schmeh, K. 2006. The East German encryption machine T-310 and the algorithm it used. Cryptologia 30 (3), 251–7.
- Schmeh, K. 2011. Die Erben der enigma [book about post-WW2 cryptography in East and West Germany, 90 pages]. Essen: Secunet.
- Schneier, B., and J. Kelsey. 1996. Unbalanced Feistel networks and block cipher design. https://link.springer.com/content/pdf/10.1007%2F3–540-60865–6_49.pdf.
- Shimizu, A., and S. Miyaguchi. 1987. Fast data encipherment algorithm FEAL. In Advances in Cryptology—EUROCRYPT’ 87, ed. D. Chaum, and W. L. Price, 267–78.
- Wheeler, D., and R. Needham. 1994. TEA, a tiny encryption algorithm. Fast software Encryption: Second International Workshop, Leuven. Lecture Notes in Computer Science, Vol. 1008, 363–6.
- Whiting, D., et al. 2003. Helix: Fast encryption and authentication in a single cryptographic primitive fast software encryption - FSE, 330–346.
- Whiting, D., et al. 2004. Phelix: Fast encryption and authentication in a single cryptographic primitive. https://www.schneier.com/academic/paperfiles/paper-phelix.pdf.