The Data Encryption Standard (DES) and its strength against attacks
From MaRDI portal
Publication:4320790
DOI10.1147/rd.383.0243zbMath0939.68623OpenAlexW2007326055WikidataQ55868759 ScholiaQ55868759MaRDI QIDQ4320790
No author found.
Publication date: 4 July 2000
Published in: IBM Journal of Research and Development (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1147/rd.383.0243
Related Items (24)
A new one-dimensional chaotic system with applications in image encryption ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes ⋮ NSA and dual EC\(\_\)DRBG: Déjà vu all over again? ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Variant of DES-128, 192, 256 ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ The design of composite permutations with applications to DES-like S-boxes ⋮ On the bifurcation of Marotto's map and its application in image encryption ⋮ A novel image encryption algorithm based on SPWLCM and DNA coding ⋮ О групповых свойствах классов SH- и TH-алгоритмов Фейстеля с линейно зависящими от координат ключа функциями усложнения;On group properties of classes Source-Heavy and Target-Heavy Feistel block ciphers with round functions linear dependent on round keys parts ⋮ Towards the optimality of Feistel ciphers with substitution-permutation functions ⋮ Quantum meet-in-the-middle attack on Feistel construction ⋮ Asymmetric image authentication algorithm using double random modulus decomposition and CGI ⋮ A New Design of Substitution Box with Ideal Strict Avalanche Criterion ⋮ Dynamical analysis and encryption key-distribution application of new q-deformed reduced Lorenz system ⋮ Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding ⋮ Triggering parametric-down conversion-based quantum key distribution via radiation field ⋮ Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants ⋮ Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings ⋮ Hill Climbing Algorithms and Trivium ⋮ Formulations of some bit switching functions in DES ⋮ 3D: A Three-Dimensional Block Cipher ⋮ Further analytical bifurcation analysis and applications of coupled logistic maps ⋮ A new image alternate encryption algorithm based on chaotic map
This page was built for publication: The Data Encryption Standard (DES) and its strength against attacks