Serpent (cipher) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Serpent (cipher)" in English language version.

refsWebsite
Global rank English rank
670th place
480th place
2nd place
2nd place
1st place
1st place
8,888th place
6,276th place
4th place
4th place
low place
low place
5th place
5th place
5,032nd place
3,357th place

cam.ac.uk

cl.cam.ac.uk

doi.org

  • Huaxiong Wang, Hongjun Wu & Phuong Ha Nguyen (2011). "Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis" (PDF). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 6812. ACISP 2011. pp. 61–74. doi:10.1007/978-3-642-22497-3_5. ISBN 978-3-642-22496-6. Archived from the original (PDF) on 14 April 2017. Retrieved 25 September 2014.
  • Nechvatal, J.; Barker, E.; Bassham, L.; Burr, W.; Dworkin, M.; Foti, J.; Roback, E. (May 2001). "Report on the development of the Advanced Encryption Standard (AES)". Journal of Research of the National Institute of Standards and Technology. 106 (3): 511–577. doi:10.6028/jres.106.023. ISSN 1044-677X. PMC 4863838. PMID 27500035.
  • Biham, Eli; Dunkelman, Orr; Keller, Nathan (2001). "Linear Cryptanalysis of Reduced Round Serpent". In Matsui, Mitsuru (ed.). Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers. Lecture Notes in Computer Science. Vol. 2355. Springer. pp. 16–27. doi:10.1007/3-540-45473-X_2.

iacr.org

eprint.iacr.org

nih.gov

ncbi.nlm.nih.gov

pubmed.ncbi.nlm.nih.gov

ntu.edu.sg

www3.ntu.edu.sg

  • Huaxiong Wang, Hongjun Wu & Phuong Ha Nguyen (2011). "Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis" (PDF). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 6812. ACISP 2011. pp. 61–74. doi:10.1007/978-3-642-22497-3_5. ISBN 978-3-642-22496-6. Archived from the original (PDF) on 14 April 2017. Retrieved 25 September 2014.

schneier.com

web.archive.org

  • Huaxiong Wang, Hongjun Wu & Phuong Ha Nguyen (2011). "Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis" (PDF). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 6812. ACISP 2011. pp. 61–74. doi:10.1007/978-3-642-22497-3_5. ISBN 978-3-642-22496-6. Archived from the original (PDF) on 14 April 2017. Retrieved 25 September 2014.
  • Bruce Schneier; John Kelsey; Doug Whiting; David Wagner; Chris Hall. Niels Fergusonk; Tadayoshi Kohno; Mike Stay (2000). "The Twofish Team's Final Comments on AES Selection" (PDF). Archived from the original (PDF) on 2 January 2010. Retrieved 19 January 2015.

worldcat.org

search.worldcat.org