<--- Back to Details
First PageDocument Content
Cryptography / Data Encryption Standard / Applied mathematics / Software optimization / Cryptanalysis / Block cipher / FEAL / Brute-force attack / Rainbow table / Cipher / Reconfigurable computing / EFF DES cracker
Date: 2005-03-13 11:27:25
Cryptography
Data Encryption Standard
Applied mathematics
Software optimization
Cryptanalysis
Block cipher
FEAL
Brute-force attack
Rainbow table
Cipher
Reconfigurable computing
EFF DES cracker

Exhaustive Key Search of the DES: Updates and Refinements Jean-Jacques Quisquater & Fran¸cois-Xavier Standaert UCL Crypto Group Laboratoire de Micro´electronique Universit´e Catholique de Louvain

Add to Reading List

Source URL: www.hyperelliptic.org

Download Document from Source Website

File Size: 151,64 KB

Share Document on Facebook

Similar Documents

International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

DocID: 1uAKb - View Document

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

DocID: 1udaS - View Document

emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

DocID: 1rs50 - View Document

Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL:   Phone

Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL: Phone

DocID: 1rpZf - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document