How to decrypt or even substitute DES-encrypted messages in 228 steps
- 1 November 2002
- journal article
- research article
- Published by Elsevier in Information Processing Letters
- Vol. 84 (3) , 117-124
- https://doi.org/10.1016/s0020-0190(02)00269-7
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Advanced Encryption Standard (AES)Published by National Institute of Standards and Technology (NIST) ,2001
- Cryptanalysis of Triple Modes of OperationJournal of Cryptology, 1999
- Cryptanalysis of Multiple Modes of OperationJournal of Cryptology, 1998
- An improvement of Davies’ attack on DESJournal of Cryptology, 1997
- On the security of multiple encryptionCommunications of the ACM, 1981
- A cryptanalytic time-memory trade-offIEEE Transactions on Information Theory, 1980
- IV. `Hellman presents no shortcut solutions to the DES'IEEE Spectrum, 1979
- HOW TO SWINDLE RABINCryptologia, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977