Efficient hardware and software implementations for the DES
Proceedings of CRYPTO 84 on Advances in cryptology
Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
Cryptography, a Primer
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with
CRYPTO '85 Advances in Cryptology
A High-Speed DES Implementation for Network Applications
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Optimal Resistance Against the Davies and Murphy Attack
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A 155 Mbps Triple-DES Network Encryptor
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Flip-Chip Implementation of the Data Encryption Standard (DES)
MCMC '97 Proceedings of the 1997 Conference on IEEE Multi-Chip Module Conference
High-performance interface architectures for cryptographic hardware
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Several improvements to realize implementations for DES are discussed. One proves that the initial permutation and the inverse initial permutation can be located at the input, respectively the output of each mode in DES. A realistic design for an exhaustive key search machine is presented.