The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ≤ 48 Bit Keys?)
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 537-542
- https://doi.org/10.1007/3-540-39799-x_43
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Key Management for Secure Electronic Funds Transfer in a Retail EnvironmentPublished by Springer Nature ,2000
- Dependence of output on input in DES: Small avalanche characteristicsPublished by Springer Nature ,2000
- Efficient hardware implementation of the DESPublished by Springer Nature ,2000
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Fast decipherment algorithm for RSA public-key cryptosystemElectronics Letters, 1982
- A cryptanalytic time-memory trade-offIEEE Transactions on Information Theory, 1980
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977