-
1
-
-
0005351920
-
An Improvement of Davies' Attack on DES
-
Biham, E., Biryukov, A.: An Improvement of Davies' Attack on DES. Journal of Cryptology 10(3), 195-206 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 195-206
-
-
Biham, E.1
Biryukov, A.2
-
3
-
-
85034623360
-
Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
4
-
-
38349067452
-
-
CNET News.com, Users take crack at 56-bit crypto (1997), Available on-line at http://news.com.com/2100-1023-278668.html?legacy-cnet
-
CNET News.com, Users take crack at 56-bit crypto (1997), Available on-line at http://news.com.com/2100-1023-278668.html?legacy-cnet
-
-
-
-
6
-
-
38349043459
-
-
Investigation of a Potential Weakness in the DES Algorithm, private communications
-
Davies, D.W.: Investigation of a Potential Weakness in the DES Algorithm, private communications (1987)
-
(1987)
-
-
Davies, D.W.1
-
7
-
-
0029632042
-
Pairs and Triplets of DES S-Boxes
-
Davies, D.W., Murphy, S.: Pairs and Triplets of DES S-Boxes. Journal of Cryptology 8(1), 1-25 (1995)
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 1-25
-
-
Davies, D.W.1
Murphy, S.2
-
8
-
-
0017501281
-
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
-
Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10(6), 74-84 (1977)
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
11
-
-
84974667019
-
-
Knudsen, L.R., Mathiassen, J.E.: A Chosen-Plaintext Linear Attack on DES. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 262-272. Springer, Heidelberg (2001)
-
Knudsen, L.R., Mathiassen, J.E.: A Chosen-Plaintext Linear Attack on DES. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 262-272. Springer, Heidelberg (2001)
-
-
-
-
12
-
-
33750843983
-
-
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 101-118. Springer, Heidelberg (2006)
-
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 101-118. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
33646773958
-
New Improvements of Davies-Murphy Cryptanalysis
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Kunz-Jacques, S., Muller, F.: New Improvements of Davies-Murphy Cryptanalysis. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 425-442. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 425-442
-
-
Kunz-Jacques, S.1
Muller, F.2
-
14
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
15
-
-
38149098365
-
-
National Bureau of Standards, Standard, Federal Information Processing Standards Publications No. 46
-
National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publications No. 46 (1977)
-
(1977)
Data Encryption
-
-
-
16
-
-
38349032306
-
New Light-Weight DES Variants Suited for RFID Applications
-
Proceedings of Fast Software Encryption, Springer, Heidelberg to appear
-
Poschmann, A., Leander, G., Schramm, K., Paar, C.: New Light-Weight DES Variants Suited for RFID Applications. In: Proceedings of Fast Software Encryption 14. LNCS, Springer, Heidelberg (to appear, 2007)
-
(2007)
LNCS
, vol.14
-
-
Poschmann, A.1
Leander, G.2
Schramm, K.3
Paar, C.4
-
18
-
-
1442325710
-
On the Security of DES
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Shamir, A.: On the Security of DES. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 280-281, Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 280-281
-
-
Shamir, A.1
-
19
-
-
84957673653
-
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Shimoyama, T., Kaneko, T.: Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 200-211. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 200-211
-
-
Shimoyama, T.1
Kaneko, T.2
-
20
-
-
38349073174
-
-
RSA Data Security, Team of Universities, Companies and Individual Computer Users Linked Over the Internet Crack RSA's 56-Bit DES Challenge (1997), Available on-line at http://www.rsasecurity.com/news/pr/970619-l.html
-
RSA Data Security, Team of Universities, Companies and Individual Computer Users Linked Over the Internet Crack RSA's 56-Bit DES Challenge (1997), Available on-line at http://www.rsasecurity.com/news/pr/970619-l.html
-
-
-
-
21
-
-
1842531284
-
Efficient DES Key Search
-
Technical Report TR-244, Carleton University. In: Stinson, D.R, ed, CRYPTO 1993. LNCS, 773, Springer, Heidelberg
-
Wiener, M.J.: Efficient DES Key Search, Technical Report TR-244, Carleton University. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, Springer, Heidelberg (1994)
-
(1994)
-
-
Wiener, M.J.1
|