Back to Results
First PageMeta Content
Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL


Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir
Add to Reading List

Document Date: 2012-10-14 17:28:33


Open Document

File Size: 634,49 KB

Share Result on Facebook

Company

IBM / Let us / /

Currency

pence / USD / /

Facility

By building / DES-like Cryptosystems Eli Biham Adi Shamir The Weizmann Institute of Science Department / /

IndustryTerm

search machine / civilian applications / exhaustive search / subsequent key search / encryption algorithm / basic tool / /

Organization

U.S. National Bureau of Standards / Weizmann Institute of Science Department of Apllied Mathematics / /

Person

Donald W. Davies / /

Technology

Encryption / DES algorithm / following algorithm / VLSI chip / encryption algorithm / key scheduling algorithm / attacking algorithm / 1990 Abstract The Data Encryption / /

SocialTag