How to bypass the Wassenaar arrangement: a new application for watermarking
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Proofs of Security for the Unix Password Hashing Algorithm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
BeepBeep: Embedded Real-Time Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Proceedings of the 8th IMA International Conference on Cryptography and Coding
DES Cracking on the Transmogrifier 2a
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
The advanced encryption standard
Cryptologia
Selecting the Advanced Encryption Standard
IEEE Security and Privacy
A Java implemented key collision attack on the data encryption standard (DES)
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
Designs, Codes and Cryptography
Cryptographic Hash Standards: Where Do We Go from Here?
IEEE Security and Privacy
P2P's significance for eBusiness: towards a research agenda
Journal of Theoretical and Applied Electronic Commerce Research
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
SC-CFS: smartcard secured cryptographic file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
SC-CFS: smartcard secured cryptographic file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
High-Speed Search System for PGP Passphrases
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
An energy efficient security protocol for IEEE 802.11 WLANs
Pervasive and Mobile Computing
Improved meet-in-the-middle attacks on reduced-round DES
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Dependability metrics
Password recovery for encrypted ZIP archives using GPUs
Proceedings of the 2010 Symposium on Information and Communication Technology
WiFi and WiMAX secure deployments
Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Sparse Boolean equations and circuit lattices
Designs, Codes and Cryptography
PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware
Transactions on computational science X
Exposing iClass key diversification
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
A tutorial on high performance computing applied to cryptanalysis
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
One year of SSL internet measurement
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
From the Publisher:In clear, easy to read and understand language, this controversial book reveals the full technical details on how researchers and data recovery engineers can build a DES cracker. It includes design specifications and board schematics, as well as full source code for the custom chip.