Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,221
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology
Des has no Per Round Linear Factors
other
Author(s):
J. A. Reeds
,
J. L. Manferdelli
Publication date
(Online):
November 24 2000
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Relief - Revue électronique de littérature française
Author and book information
Book Chapter
Pages
: 377-389
DOI:
10.1007/3-540-39568-7_29
SO-VID:
e206a9f7-d639-4cf6-9181-41f989bd6d07
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 10
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
pp. 47
Identity-Based Cryptosystems and Signature Schemes
pp. 54
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)
pp. 231
Generalized Linear Threshold Scheme
pp. 242
Security of Ramp Schemes
pp. 276
On the Cryptographic Applications of Random Functions (Extended Abstract)
pp. 289
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
pp. 342
Breaking Iterated Knapsacks
pp. 359
Dependence of output on input in DES: Small avalanche characteristics
pp. 377
Des has no Per Round Linear Factors
pp. 393
A Message Authenticator Algorithm Suitable for a Mainframe Computer
pp. 411
Authentication Theory/Coding Theory
Similar content
3,221
Actin cross-linking domain of Aeromonas hydrophila repeat in toxin A (RtxA) induces host cell rounding and apoptosis.
Authors:
Giovanni Suarez
,
Bijay Khajanchi
,
Johanna Sierra
…
Grand Rounds: Asbestos-Related Pericarditis in a Boiler Operator
Authors:
Belayneh A Abejie
,
Eugene Chung
,
Richard W. Nesto
…
The detection of small round-structured viruses in water and environmental materials
Authors:
Jane Shore
,
R Pallin
,
C Dedoussis
…
See all similar
Cited by
4
Cryptanalysis of des with a Reduced Number of Rounds
Authors:
David Chaum
,
Jan-Hendrik Evertse
The One-Round Functions of the DES Generate the Alternating Group
Authors:
Ralph Wernsdorf
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Authors:
Gregor Leander
,
Brice Minaud
,
Sondre Rønjom
See all cited by