RC5 (German Wikipedia)

Analysis of information sources in references of the Wikipedia article "RC5" in German language version.

refsWebsite
Global rank German rank
123rd place
6th place
2nd place
3rd place
214th place
161st place
800th place
160th place
1st place
1st place
6,450th place
low place
low place
low place
low place
low place

distributed.net

doi.org

espacenet.com

worldwide.espacenet.com

  • Patent US5724428A: Block encryption algorithm with data-dependent rotations. Angemeldet am 1. November 1995, veröffentlicht am 3. März 1998, Anmelder: RSA Data Security, Erfinder: Ronald L. Rivest.

ietf.org

datatracker.ietf.org

  • Ronald Rivest, Robert W. Baldwin: RFC: 2040 – The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. (englisch).

mun.ca

engr.mun.ca

  • Howard M. Heys: Linearly weak keys of RC5. In: IEE Electronics Letters. Band 33, Nr. 10, 8. Mai 1997, ISSN 0013-5194, S. 836–838 (engr.mun.ca [PDF]).

rsa.com

web.archive.org

  • Takeshi Shimoyama, Kiyofumi Takeuchi, Juri Hayakawa: Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6. Hrsg.: NIST. 2000 (csrc.nist.gov (Memento vom 8. November 2004 im Internet Archive) [PDF] zu AES3 eingereicht).

zdb-katalog.de

  • Johan Borst, Bart Preneel, Joos Vandewalle: Linear Cryptanalysis of RC5 and RC6. In: Lecture Notes in Computer Science. Band 1636, Nr. 1999. Springer, 1999, ISSN 1611-3349, S. 16.
  • John Kelsey, Bruce Schneier, David Wagner: Mod n Cryptanalysis, with Applications against RC5P and M6. In: Lecture Notes in Computer Science. Band 1636/1999. Springer, 1999, ISSN 1611-3349, S. 139.
  • Burton S. Kaliski Jr., Yiqun Lisa Yin: On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm. In: Lecture Notes in Computer Science. Band 963/1995. Springer, 1995, ISSN 1611-3349, S. 171.
  • Lars R. Knudsen, Willi Meier: Improved Differential Attacks on RC5. In: Lecture Notes in Computer Science. Band 1109/1996. Springer, 1996, ISSN 1611-3349, S. 216.
  • Ali Aydin Selçuk: New Results in Linear Cryptanalysis of RC5. In: Lecture Notes in Computer Science. Band 1372/1998. Springer, 1998, ISSN 1611-3349, S. 1.
  • Howard M. Heys: Linearly weak keys of RC5. In: IEE Electronics Letters. Band 33, Nr. 10, 8. Mai 1997, ISSN 0013-5194, S. 836–838 (engr.mun.ca [PDF]).
  • Atsuko Miyaji, Masao Nonaka, Yoshinori Takii: Known Plaintext Correlation Attack against RC5. In: Lecture Notes in Computer Science. Band 2271/2002. Springer, 2002, ISSN 1611-3349, S. 115–141.
  • Helena Handschuh, Howard M. Heys: A Timing Attack on RC5. In: Lecture Notes in Computer Science. Band 1556/1999. Springer, 1999, ISSN 1611-3349, S. 631.