Author:
Clayton Richard,Bond Mike
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lect Notes Comput Sci;M. Bond,1997
2. Lect Notes Comput Sci;E. F. Brickell,1987
3. Lect Notes Comput Sci;M. Davio,1985
4. W. Diffie and M. E. Hellman: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. IEEE Computer 10(6), pp 74–84 (1977)
5. Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O'Reilly. (May 1998)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comparison of a Chaotic Cryptosystem with Other Cryptography Systems;Engineering, Technology & Applied Science Research;2020-10-26
2. Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA;Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16;2016
3. Security Protocols and Evidence: Where Many Payment Systems Fail;Financial Cryptography and Data Security;2014
4. Cryptography Enabled Security Guarantees for over the Top Networks Using GSM Short Messaging Service;Recent Advances in Computer Science and Information Engineering;2012
5. An Introduction to Security API Analysis;Foundations of Security Analysis and Design VI;2011