next up previous
Next: About this document ... Up: Quantifying the Costs of Previous: Limitations and Future Work

Bibliography

Schneier99
Performance Comparison of the AES Submissions, B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall and N. Ferguson, Second AES Candidate Conference, April 1999.

Schneier00
A Performance Comparison of the Five AES Finalists, B. Schneier and D. Whiting, Third AES Candidate Conference, 2000.

Goodman
A Scalable Low Power Encryption for Wireless Networks, James Goodman and Anantha P. Chandrakasan, Wireless Networks , 1998.

Touch95
Performance Analysis of MD5, Joseph D. Touch, SIGCOMM '95.

Schneier97
Designing Encryption Algorithms for Optimal Software Speed, Bruce Schneier et al, Fast Software Encryption, 1997 St.-Michel.

Preneel
Principles and Performance of Cryptographic Algorithms, Bart Preneel et al, Dr. Dobb's Journal, Dec 1998.

Twofish
Twofish: A 128-bit Block Cipher, B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, http://www.counterpane.com/twofish-paper.html

Codec
MPEG-2 Video Codec MPEG Software Simulation Group (MSSG). http://www.mpeg.org/MPEG/MSSG/#source

Schneier-book
Applied Cryptography, Second Edition, Bruce Schneier, John Wiley & Sons, 1996



Ramadass Nagarajan
2000-05-11