Attacking Triple Encryption
- 16 October 1998
- book chapter
- Published by Springer Nature
- p. 239-253
- https://doi.org/10.1007/3-540-69710-1_16
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- How to Protect DES Against Exhaustive Key SearchPublished by Springer Nature ,1996
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESPublished by Springer Nature ,1996
- Improving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudePublished by Springer Nature ,1996
- A Known-Plaintext Attack on Two-Key Triple EncryptionPublished by Springer Nature ,1991
- On the security of multiple encryptionCommunications of the ACM, 1981