By using a large number of round, we hope to be able to scrounge an Sbox out of nowhere, in an environment for which even TEA and the SAFERs are gross overdesign.
CITATION STYLE
Yuval, G. (1997). Reinventing the travois: Encryption/MAC in 30 ROM bytes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1267, pp. 205–209). Springer Verlag. https://doi.org/10.1007/bfb0052347
Mendeley helps you to discover research relevant for your work.