|
Browse All Reviews > Data (E) > Data Encryption (E.3) > Data Encryption Standard (DES) (E.3...)
|
|
|
|
|
|
|
|
|
1-6 of 6
Reviews about "Data Encryption Standard (DES) (E.3...)":
|
Date Reviewed |
|
Cryptography policy Hoffman L., Ali F., Heckler S., Huybrechts A. Communications of the ACM 37(9): 109-117, 1994. Type: Article
The security of information is a real problem. To solve it, specialists are developing different techniques to protect data. One of them is encryption. Encryption is just beginning to emerge as a significant part of the computer securi...
|
Feb 1 1996 |
|
Differential cryptanalysis of the data encryption standard Biham E., Shamir A., Springer-Verlag, London, UK, 1993. Type: Book (9780387979304)
A cryptanalytic method of attack called “differential cryptanalysis” is described in this compact but useful book. The attack is applicable to a variety of cryptographic systems, and the book shows how it can be use...
|
Feb 1 1994 |
|
Superimposing encrypted data Yu K., Yu T. Communications of the ACM 34(2): 48-54, 1991. Type: Article
The authors are concerned with the processing of encrypted data. For example, could we take an encrypted amount in hundreds of dollars and convert it to yen (that is, multiply it by a known constant, such as 12,689), thus obtaining a...
|
Aug 1 1991 |
|
Processing encrypted data Ahituv N., Lapid Y., Neumann S. Communications of the ACM 30(9): 777-780, 1987. Type: Article
In this paper the authors consider several means of encrypting data so that arithmetic operations can be performed on the data without decryption. They limit themselves to cases in which the operation performed on both plaintext and ci...
|
Dec 1 1988 |
|
Cycle structure of the DES for keys having palindromic (or antipalindromic) sequences of round keys Moore J., Simmons G. IEEE Transactions on Software Engineering SE-13(2): 262-273, 1987. Type: Article
The data encryption standard (DES) is an encryption method of substantial practical importance; it is widely used in commercial transactions. This paper deals with an issue that is directly related to the question of how secure the DES...
|
Feb 1 1988 |
|
A randomized protocol for signing contracts Even S., Goldreich O., Lempel A. Communications of the ACM 28(6): 637-647, 1985. Type: Article
The increasing acceptance of electronic mail as a business tool has revealed a few problems which have not been manifested in its nonelectronic counterpart. Thus, the signing of a contract between two parties necessitates the electroni...
|
Dec 1 1985 |
|
|
|
|
|
|