<--- Back to Details
First PageDocument Content
Cryptography / Data Encryption Standard / Applied mathematics / Software optimization / Cryptanalysis / Block cipher / FEAL / Brute-force attack / Rainbow table / Cipher / Reconfigurable computing / EFF DES cracker
Date: 2005-03-13 11:27:25
Cryptography
Data Encryption Standard
Applied mathematics
Software optimization
Cryptanalysis
Block cipher
FEAL
Brute-force attack
Rainbow table
Cipher
Reconfigurable computing
EFF DES cracker

Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain

Add to Reading List

Source URL: www.hyperelliptic.org

Download Document from Source Website

File Size: 151,64 KB

Share Document on Facebook

Similar Documents

The Uses of Memory: In the Time of the Butterflies and The Farming of Bones  Elsa Luciano Feal University of Puerto Rico, Arecibo Make an effort to remember. Or, failing that, invent. [Monica Wittig, Les guerilleres, 196

The Uses of Memory: In the Time of the Butterflies and The Farming of Bones Elsa Luciano Feal University of Puerto Rico, Arecibo Make an effort to remember. Or, failing that, invent. [Monica Wittig, Les guerilleres, 196

DocID: 1v4td - View Document

ACCIÓN FORMATIVA: CURSO PINTOR/A ADMITIDOS/AS JOSÉ TIZÓN MARTÍNEZ ANTOLÍN RIOPEDRE MESA MANUEL FEAL BLANCO MANUEL FERNÁNDEZ RODRÍGUEZ

ACCIÓN FORMATIVA: CURSO PINTOR/A ADMITIDOS/AS JOSÉ TIZÓN MARTÍNEZ ANTOLÍN RIOPEDRE MESA MANUEL FEAL BLANCO MANUEL FERNÁNDEZ RODRÍGUEZ

DocID: 1swsm - View Document

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

DocID: 19IAc - View Document

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

DocID: 19flA - View Document

Dierential Cryptanalysis of DES-like Cryptosystems Eli Biham  Adi Shamir

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

DocID: 16Aja - View Document