Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
4
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,386
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — CRYPTO’ 86
Structure in the S-Boxes of the DES (extended abstract)
other
Author(s):
E. F. Brickell
,
J. H. Moore
,
M. R. Purtill
Publication date
(Online):
December 1 2000
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Relief - Revue électronique de littérature française
Most cited references
4
Record
: found
Abstract
: not found
Book
: not found
Cryptography: A Primer
AG Konheim
,
A. Konheim
,
A. C. Konheim
…
(1981)
0
comments
Cited
8
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the Security of DES
Adi Shamir
(1986)
0
comments
Cited
7
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Cryptography and Data Security
D.E. Denning
,
D. W. Denning
(1983)
0
comments
Cited
2
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 3-8
DOI:
10.1007/3-540-47721-7_1
SO-VID:
538449eb-5d36-4178-a62d-231ca6f6265d
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Structure in the S-Boxes of the DES (extended abstract)
pp. 84
A Pseudo-Random Bit Generator Based on Elliptic Logarithms
pp. 118
A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations
pp. 171
How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract)
pp. 186
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
pp. 200
Demonstrating Possession of a Discrete Logarithm Without Revealing it
pp. 234
All-or-Nothing Disclosure of Secrets
pp. 251
Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract)
pp. 311
Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor
Similar content
2,386
Linking Deutsche Bundesbank Company Data using Machine-Learning-Based Classification : Extended Abstract
Authors:
Christopher-J. Schild
,
Simone Schultz
Untersuchungen �ber das Gef�ss-system des Pankreasl�ppchens bei verschiedenen S�ugern mit besonderer Ber�cksichtigung der Kapillarkn�uel der Langerhansschen Inseln
Authors:
Annamarie Thiel
How to withstand mobile virus attacks (extended abstract)
Authors:
Rafail Ostrovsky
,
Moti Yung
See all similar
Cited by
4
Differential Cryptanalysis of DES-like Cryptosystems
Authors:
Eli Biham
,
Adi Shamir
Cryptanalysis: a survey of recent results
Authors:
A.M Odlyzko
,
E.F. Brickell
Propagation Characteristics of Boolean Functions
Authors:
Bart Preneel
,
Werner Van Leekwijck
,
Luc Van Linden
…
See all cited by