The Data Encryption Standard (DES) and its strength against attacks

From MaRDI portal
Publication:4320790

DOI10.1147/rd.383.0243zbMath0939.68623OpenAlexW2007326055WikidataQ55868759 ScholiaQ55868759MaRDI QIDQ4320790

No author found.

Publication date: 4 July 2000

Published in: IBM Journal of Research and Development (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1147/rd.383.0243




Related Items (24)

A new one-dimensional chaotic system with applications in image encryptionCryptographic Analysis of All 4 × 4-Bit S-BoxesNSA and dual EC\(\_\)DRBG: Déjà vu all over again?Extended meet-in-the-middle attacks on some Feistel constructionsVariant of DES-128, 192, 256On Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureThe design of composite permutations with applications to DES-like S-boxesOn the bifurcation of Marotto's map and its application in image encryptionA novel image encryption algorithm based on SPWLCM and DNA codingО групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys partsTowards the optimality of Feistel ciphers with substitution-permutation functionsQuantum meet-in-the-middle attack on Feistel constructionAsymmetric image authentication algorithm using double random modulus decomposition and CGIA New Design of Substitution Box with Ideal Strict Avalanche CriterionDynamical analysis and encryption key-distribution application of new q-deformed reduced Lorenz systemQuantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw findingTriggering parametric-down conversion-based quantum key distribution via radiation fieldAdvanced Truncated Differential Attacks Against GOST Block Cipher and Its VariantsCryptanalysis of White-Box DES Implementations with Arbitrary External EncodingsHill Climbing Algorithms and TriviumFormulations of some bit switching functions in DES3D: A Three-Dimensional Block CipherFurther analytical bifurcation analysis and applications of coupled logistic mapsA new image alternate encryption algorithm based on chaotic map




This page was built for publication: The Data Encryption Standard (DES) and its strength against attacks