Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Data (E) > Data Encryption (E.3) > Data Encryption Standard (DES) (E.3...)  
 
Options:
 
  1-6 of 6 Reviews about "Data Encryption Standard (DES) (E.3...)": Date Reviewed
  Cryptography policy
Hoffman L., Ali F., Heckler S., Huybrechts A. Communications of the ACM 37(9): 109-117, 1994.  Type: Article

The security of information is a real problem. To solve it, specialists are developing different techniques to protect data. One of them is encryption. Encryption is just beginning to emerge as a significant part of the computer securi...

Feb 1 1996
  Differential cryptanalysis of the data encryption standard
Biham E., Shamir A., Springer-Verlag, London, UK, 1993.  Type: Book (9780387979304)

A cryptanalytic method of attack called “differential cryptanalysis” is described in this compact but useful book. The attack is applicable to a variety of cryptographic systems, and the book shows how it can be use...

Feb 1 1994
  Superimposing encrypted data
Yu K., Yu T. Communications of the ACM 34(2): 48-54, 1991.  Type: Article

The authors are concerned with the processing of encrypted data. For example, could we take an encrypted amount in hundreds of dollars and convert it to yen (that is, multiply it by a known constant, such as 12,689), thus obtaining a...

Aug 1 1991
  Processing encrypted data
Ahituv N., Lapid Y., Neumann S. Communications of the ACM 30(9): 777-780, 1987.  Type: Article

In this paper the authors consider several means of encrypting data so that arithmetic operations can be performed on the data without decryption. They limit themselves to cases in which the operation performed on both plaintext and ci...

Dec 1 1988
  Cycle structure of the DES for keys having palindromic (or antipalindromic) sequences of round keys
Moore J., Simmons G. IEEE Transactions on Software Engineering SE-13(2): 262-273, 1987.  Type: Article

The data encryption standard (DES) is an encryption method of substantial practical importance; it is widely used in commercial transactions. This paper deals with an issue that is directly related to the question of how secure the DES...

Feb 1 1988
  A randomized protocol for signing contracts
Even S., Goldreich O., Lempel A. Communications of the ACM 28(6): 637-647, 1985.  Type: Article

The increasing acceptance of electronic mail as a business tool has revealed a few problems which have not been manifested in its nonelectronic counterpart. Thus, the signing of a contract between two parties necessitates the electroni...

Dec 1 1985
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy