메뉴 건너뛰기




Volumn 1372, Issue , 1998, Pages 239-253

Attacking triple encryption

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947908749     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-69710-1_16     Document Type: Conference Paper
Times cited : (30)

References (8)
  • 1
    • 0343236278 scopus 로고    scopus 로고
    • Technical report CS0884, Computer Science department, Technion, 1996, found in the www3
    • E. Biham, How to forge DES-Encrypted Messages in 228 steps, Technical report CS0884, Computer Science department, Technion, 1996, found in the www3.
    • How to Forge Des-Encrypted Messages in 228 Steps
    • Biham, E.1
  • 2
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES
    • Springer LNCS 1109
    • J. Kelsey, B. Schneier, D. Wagner, \Key-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES", Crypto '96, Springer LNCS 1109, 237-251.
    • Crypto '96 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 3
    • 84955573096 scopus 로고    scopus 로고
    • How to protect DES against exhaustive key search
    • Springer LNCS 1109
    • J. Kilian, P. Rogaway, How to protect DES against exhaustive key search, Crypto '96, Springer LNCS 1109, 252-267, full version found in the www4.
    • Crypto '96 , pp. 252-267
    • Kilian, J.1    Rogaway, P.2
  • 6
    • 85034504281 scopus 로고    scopus 로고
    • A known-plaintext attack on two-key triple encryption
    • Springer LNCS
    • P.C. van Oorschot, M.J. Wiener, A known-plaintext attack on two-key triple encryption, Eurocrypt '90, Springer LNCS 473, 318-325.
    • Eurocrypt '90 , vol.473 , pp. 318-325
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 8
    • 0001797564 scopus 로고    scopus 로고
    • PayWord and MicroMint, two simple micropayment schemes
    • R.L. Rivest, A. Shamir, PayWord and MicroMint, two simple micropayment schemes, CryptoBytes, Vol. 2, No. 1 (1996), 7-11.
    • (1996) Cryptobytes , vol.2 , Issue.1 , pp. 7-11
    • Rivest, R.L.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.