메뉴 건너뛰기




Volumn 12, Issue 5, 1993, Pages 477-500

More efficient software implementations of (generalized) DES

Author keywords

Authentication; Encryption; Generalizations of DES; Implementation of permutation in assembly language; Modes of operation; Multiple encryption; Software implementation of Data Encryption Standard

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; DATA HANDLING; FUNCTION EVALUATION; SECURITY OF DATA; STANDARDS;

EID: 0027647321     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/0167-4048(93)90069-H     Document Type: Article
Times cited : (10)

References (49)
  • 4
    • 37049179477 scopus 로고
    • NSA to provide secret codes
    • (1985) Science , vol.230 , pp. 45-46
    • Kolata1
  • 6
    • 84914769040 scopus 로고
    • NSA explains encryption program to IEEE Privacy Subcommittee
    • (1986) The Institute, IEEE , vol.10 , Issue.9 , pp. 2
    • Horgan1
  • 8
    • 84914791002 scopus 로고
    • General News and Notes, Computer security act stresses encryption standard
    • (1987) Communications of the ACM , vol.30 , Issue.6 , pp. 572
  • 9
    • 84914800751 scopus 로고
    • Classification of “sensitive” information is once again in civilian hands
    • (1988) Computer , vol.21 , Issue.3 , pp. 124
    • Preiss1
  • 10
  • 13
    • 84914777726 scopus 로고
    • Encryption algorithm, key size is the thing
    • (1976) Datamation , vol.22 , Issue.3 , pp. 164-166
    • Yasaki1
  • 15
    • 0020903481 scopus 로고
    • Long key variants of DES
    • Plenum Press, New York
    • (1983) Crypto 82 , pp. 311-313
    • Berson1
  • 16
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 373-386
    • Luby1    Rackoff2
  • 26
    • 0000966673 scopus 로고
    • One way hash functions and DES
    • Abstracts
    • (1989) Crypto '89 , pp. 407-421
    • Merkle1
  • 33
    • 84914766845 scopus 로고
    • Effiziente Software-Implementierung von verallgemeinertem DES
    • Institut für Rechnerentwurf und Fehlertoleranz der Universität, Karlsruhe
    • (1989) Diploma-Thesis
    • Aβmann1
  • 35
    • 0003532271 scopus 로고
    • UNIX password security—ten years later
    • Springer-Verlag, Heidelberg, final version contained as appendix A
    • (1990) Crypto'89, LNCS 435 , pp. 44-63
    • Feldmeier1    Karn2
  • 36
    • 84914768725 scopus 로고
    • The Macintosh SE (system review)
    • (1987) Byte , vol.12 , Issue.9 , pp. 201-205
    • Loeb1
  • 38
    • 84914805575 scopus 로고
    • The Portable and the powerful
    • (1989) Byte , vol.14 , Issue.10 , pp. 98-108
    • Thompson1    Hayes2
  • 43
    • 84914791756 scopus 로고
    • IBM PC AT (System Review)
    • (1985) Byte , vol.10 , Issue.5 , pp. 270-277
    • Finger1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.