Secure and fast implementations of two involution ciphers

Reference:

Billy Bob Brumley. Secure and fast implementations of two involution ciphers. In Tuomas Aura, Kimmo Järvinen, and Kaisa Nyberg, editors, Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, volume 7127 of Lecture Notes in Computer Science, pages 269–282. Springer, 2012.

Suggested BibTeX entry:

@inproceedings{brumley:2010:nordsec,
    author = {Billy Bob Brumley},
    booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers},
    editor = {Tuomas Aura and Kimmo J{\"a}rvinen and Kaisa Nyberg},
    pages = {269-282},
    publisher = {Springer},
    series = {Lecture Notes in Computer Science},
    title = {Secure and fast implementations of two involution ciphers},
    volume = {7127},
    year = {2012},
}

See dx.doi.org ...