More efficient software implementations of (generalized) DES
- 31 August 1993
- journal article
- Published by Elsevier in Computers & Security
- Vol. 12 (5), 477-500
- https://doi.org/10.1016/0167-4048(93)90069-h
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- On immunity against Biham and Shamir's “differential cryptanalysis”Information Processing Letters, 1992
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991
- A study of password securityJournal of Cryptology, 1989
- Password cracking: a game of witsCommunications of the ACM, 1989
- An introduction to contemporary cryptologyProceedings of the IEEE, 1988
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- Strategies for extending the useful lifetime of DESComputers & Security, 1987
- DES key crunching for safer cypher keysACM SIGSAC Review, 1987
- NSA to Provide Secret CodesScience, 1985
- The data encryption standard--Retrospective and prospectsIEEE Communications Society Magazine, 1978