How to Protect DES Against Exhaustive Key Search
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 252-267
- https://doi.org/10.1007/3-540-68697-5_20
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- How to strengthen DES using existing hardwarePublished by Springer Nature ,1995
- Parallel collision search with application to hash functions and discrete logarithmsPublished by Association for Computing Machinery (ACM) ,1994
- A cryptographic file system for UNIXPublished by Association for Computing Machinery (ACM) ,1993
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Nature ,1993
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949