Block cipher/External Links: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
Line 40: Line 40:
* [http://nal-ir.nal.res.in/4496/ A Report on Block Ciphers (Literature Survey)], concentrating on Feistel ciphers, from the Indian National Aeronautics Lab
* [http://nal-ir.nal.res.in/4496/ A Report on Block Ciphers (Literature Survey)], concentrating on Feistel ciphers, from the Indian National Aeronautics Lab
* [http://portal.acm.org/citation.cfm?id=1138127.1138130 Survey and benchmark of block ciphers for wireless sensor networks], partly literature survey and partly requirements analysis for wireless applcations
* [http://portal.acm.org/citation.cfm?id=1138127.1138130 Survey and benchmark of block ciphers for wireless sensor networks], partly literature survey and partly requirements analysis for wireless applcations
* [http://www.ciphersbyritter.com/RES/SBOXDESN.HTM Literature survey] on S-box design, from Terry Ritter
* [http://www.ciphersbyritter.com/RES/SBOXDESN.HTM S-Box Design: A Literature Survey] from Terry Ritter


==Other links==
==Other links==
* [http://www2.mat.dtu.dk/people/Lars.R.Knudsen/bc.html Block Cipher Lounge], once an excellent index of current research, now out-of-date
* [http://www2.mat.dtu.dk/people/Lars.R.Knudsen/bc.html Block Cipher Lounge], once an excellent index of current research, now out-of-date

Revision as of 19:30, 4 June 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
Catalogs [?]
 
A hand-picked, annotated list of Web resources about Block cipher.
Please sort and annotate in a user-friendly manner and consider archiving the URLs behind the links you provide. See also related web sources.

FAQ documents

AES links

Homepages for block ciphers

RFCs for block ciphers

These RFCs give specifications for the block ciphers themselves.

There are other RFCs covering block cipher modes of operation and how these ciphers should be used in protocols such as IPsec, Open PGP, SSL and SSH. For details, see the linked articles or use RFC search.

Literature surveys

Other links