scientific article
From MaRDI portal
Publication:3710461
zbMath0584.94015MaRDI QIDQ3710461
Carl H. Meyer, Stephen M. Matyas
Publication date: 1982
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items
An analysis of a class of algorithms for \(S\)-box construction, Is the data encryption standard a group? (Results of cycling experiments on DES), On-line ciphers and the Hash-CBC constructions, A fast software one-way hash function, Nondegenerate functions and permutations, Attacks on Okamoto and Tanaka's one-way ID-based key distribution system, Revisiting key schedule's diffusion in relation with round function's diffusion, Online Ciphers from Tweakable Blockciphers, Encryption modes with almost free message integrity, Randomness measures related to subset occurrence, The RSA Cryptography Processor, How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps., Scheme for secure digital mobile communications based on symmetric key cryptography, Analytical Characteristics of the DES, On the Security of Compressed Encodings, Some Results on the Information Theoretic Analysis of Cryptosystems