Author:
Pujol Francisco A.,Mora Higinio,Luis Sánchez José,Jimeno Antonio
Subject
Computer Science (miscellaneous),Social Sciences (miscellaneous),Theoretical Computer Science,Control and Systems Engineering,Engineering (miscellaneous)
Reference9 articles.
1. How to decrypt or even substitute DES-encrypted messages in 228 steps
2. Burke, J., McDonald, J. and Austin, T. (2000), “Architectural support for fast symmetric‐key cryptography”,Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, pp. 178‐89.
3. Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D. and Whiting, D. (2000), “Improved cryptanalysis of Rijndael”,Proceedings of Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, Lecture Notes in Computer Science, Vol. 1978, pp. 213‐30.