Reference:
Billy Bob Brumley. Secure and fast implementations of two involution ciphers. In Tuomas Aura, Kimmo Järvinen, and Kaisa Nyberg, editors, Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, volume 7127 of Lecture Notes in Computer Science, pages 269–282. Springer, 2012.
Suggested BibTeX entry:
@inproceedings{brumley:2010:nordsec,
author = {Billy Bob Brumley},
booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers},
editor = {Tuomas Aura and Kimmo J{\"a}rvinen and Kaisa Nyberg},
pages = {269-282},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
title = {Secure and fast implementations of two involution ciphers},
volume = {7127},
year = {2012},
}
|