How to strengthen DES-like cryptosystems against differential cryptanalysis (1993)
- Authors:
- Autor USP: TERADA, ROUTO - IME
- Unidade: IME
- Assunto: CRIPTOLOGIA
- Keywords: cryptanalysis; differential attack; probabilistic swapping
- Language: Inglês
- Imprenta:
- Source:
- Título: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
- ISSN: 0916-8508
- Volume/Número/Paginação/Ano: v. E76-A, n.1, p. 63-69, 1993
-
ABNT
KOYAMA, Kenji e TERADA, Routo. How to strengthen DES-like cryptosystems against differential cryptanalysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v. E76-A, n. 1, p. 63-69, 1993Tradução . . Disponível em: https://search.ieice.org/bin/summary.php?id=e76-a_1_63&category=A&year=1993&lang=E&abst=. Acesso em: 12 fev. 2026. -
APA
Koyama, K., & Terada, R. (1993). How to strengthen DES-like cryptosystems against differential cryptanalysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E76-A( 1), 63-69. Recuperado de https://search.ieice.org/bin/summary.php?id=e76-a_1_63&category=A&year=1993&lang=E&abst= -
NLM
Koyama K, Terada R. How to strengthen DES-like cryptosystems against differential cryptanalysis [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1993 ; E76-A( 1): 63-69.[citado 2026 fev. 12 ] Available from: https://search.ieice.org/bin/summary.php?id=e76-a_1_63&category=A&year=1993&lang=E&abst= -
Vancouver
Koyama K, Terada R. How to strengthen DES-like cryptosystems against differential cryptanalysis [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1993 ; E76-A( 1): 63-69.[citado 2026 fev. 12 ] Available from: https://search.ieice.org/bin/summary.php?id=e76-a_1_63&category=A&year=1993&lang=E&abst= - Dynamic swapping schemes and differential cryptanalysis
- Proposal of enhancement for quartz digital signature
- Proposal of enhancement for quartz digital signature
- Certificateless key agreement protocols under strong models
- Complexidade de detecção de procedimentos recursivos
- Segurança de dados: criptografia em redes de computador
- Linguagens deterministicas
- Improved identification protocol based on the MQ problem
- A cryptographic function based on majority circuits
- Factoring a multiprime modulus N with random bits
How to cite
A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
