![]() |
Volumn 84, Issue 3, 2002, Pages 117-124
|
How to decrypt or even substitute DES-encrypted messages in 228 steps
|
Author keywords
Birthday paradox; Cryptanalysis; Cryptography; Data Encryption Standard (DES); Key collision attacks; Multiple encryption; Triple DES
|
Indexed keywords
CODES (SYMBOLS);
DATA HANDLING;
PROBABILITY;
SECURITY OF DATA;
DATA ENCRYPTION STANDARDS (DES);
CRYPTOGRAPHY;
|
EID: 0037110729
PISSN: 00200190
EISSN: None
Source Type: Journal
DOI: 10.1016/S0020-0190(02)00269-7 Document Type: Article |
Times cited : (67)
|
References (37)
|