How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Hi-index | 0.00 |