How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Efficient hardware implementation of the DES
Proceedings of CRYPTO 84 on Advances in cryptology
Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
Key management for secure electronic funds transfer in a retail environment
Proceedings of CRYPTO 84 on Advances in cryptology
Unconditionally secure authentication schemes and practical and theoretical consequences
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Is DES a pure cipher? (Results of more cycling experiments on DES)
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography, a Primer
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
Hi-index | 0.00 |
In DES the key scheduling scheme uses mainly shift registers. By modifying this key scheduling, conventional cryptosystems can be designed which are, e.g., strong against exhaustive key search attacks (without increasing the key size), or have public key like properties. Other effects obtainable by modifying the key scheduling and their importance are discussed.