33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Advances in Cryptology — CRYPTO ’96 

      How to Protect DES Against Exhaustive Key Search

      other
      ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Article: not found

          Communication Theory of Secrecy Systems*

          C. Shannon (1949)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A cryptographic file system for UNIX

            Matt Blaze (1993)
              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              How to strengthen DES using existing hardware

                Bookmark

                Author and book information

                Book Chapter
                1996
                July 13 2001
                : 252-267
                10.1007/3-540-68697-5_20
                0a2f6509-12ae-4dd8-8527-9ce5a12c1680
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,496

                Cited by20