Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Java cryptography
Java collections
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
BootJacker: compromising computers using forced restarts
Proceedings of the 15th ACM conference on Computer and communications security
Hi-index | 0.00 |
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack are described. We also demonstrate the suitability of Java for large data cryptographic attacks and illustrate the extensive cryptographic features of the language.