Search dblp for Publications

export results for "data encryption standard"

 download as .bib file

@article{DBLP:journals/elektrik/Kara24,
  author       = {Orhun Kara},
  title        = {Lower data attacks on Advanced Encryption Standard},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {32},
  number       = {2},
  pages        = {338--357},
  year         = {2024},
  url          = {https://doi.org/10.55730/1300-0632.4072},
  doi          = {10.55730/1300-0632.4072},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/elektrik/Kara24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/MoreP24,
  author       = {Kiran P. More and
                  Rajendrakumar A. Patil},
  title        = {A modified advanced encryption standard-based model for secured data
                  transmission in cognitive radio with multi-channels},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {26},
  number       = {3},
  pages        = {238--250},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJWMC.2024.137832},
  doi          = {10.1504/IJWMC.2024.137832},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/MoreP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiXZLZ24,
  author       = {Biaoqi Li and
                  Min Xu and
                  Yuan Zhou and
                  Haibin Liu and
                  Renlong Zhang},
  title        = {Optimization of Security Identification in Power Grid Data through
                  Advanced Encryption Standard Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {239--264},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1323},
  doi          = {10.13052/JCSM2245-1439.1323},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiXZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kara24,
  author       = {Orhun Kara},
  title        = {Lower data attacks on Advanced Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/483},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kara24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/X23w,
  title        = {Retracted: Accounting Data Encryption Processing Based on Data Encryption
                  Standard Algorithm},
  journal      = {Complex.},
  volume       = {2023},
  pages        = {9856582:1--9856582:1},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/9856582},
  doi          = {10.1155/2023/9856582},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/X23w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/AlhazaimehABN23,
  author       = {Obaida M. Al{-}hazaimeh and
                  Moy'awiah Al{-}Shannaq and
                  Mohammed J. Bawaneh and
                  Khalid M. O. Nahar},
  title        = {Analytical Approach for Data Encryption Standard Algorithm},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {17},
  number       = {14},
  pages        = {126--143},
  year         = {2023},
  url          = {https://doi.org/10.3991/ijim.v17i14.38641},
  doi          = {10.3991/IJIM.V17I14.38641},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/AlhazaimehABN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icce-tw/KawanoPAK23,
  author       = {Maki Kawano and
                  Shihcheng Peng and
                  Shunsuke Araki and
                  Ken'ichi Kakizaki},
  title        = {A Study on Guessing plaintexts by Neural Network against Data Encryption
                  Standard {(DES)}},
  booktitle    = {International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan
                  2023, PingTung, Taiwan, July 17-19, 2023},
  pages        = {531--532},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226974},
  doi          = {10.1109/ICCE-TAIWAN58799.2023.10226974},
  timestamp    = {Fri, 08 Sep 2023 15:28:17 +0200},
  biburl       = {https://dblp.org/rec/conf/icce-tw/KawanoPAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-05530,
  author       = {Ruby Kumari and
                  Jai Gopal Pandey and
                  Abhijit Karmakar},
  title        = {An {RTL} Implementation of the Data Encryption Standard {(DES)}},
  journal      = {CoRR},
  volume       = {abs/2301.05530},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.05530},
  doi          = {10.48550/ARXIV.2301.05530},
  eprinttype    = {arXiv},
  eprint       = {2301.05530},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-05530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/RamachandraRLDB22,
  author       = {Mohan Naik Ramachandra and
                  Madala Srinivasa Rao and
                  Wen{-}Cheng Lai and
                  Parameshachari Bidare Divakarachari and
                  Jayachandra Ananda Babu and
                  Hemalatha Kivudujogappa Lingappa},
  title        = {An Efficient and Secure Big Data Storage in Cloud Environment by Using
                  Triple Data Encryption Standard},
  journal      = {Big Data Cogn. Comput.},
  volume       = {6},
  number       = {4},
  pages        = {101},
  year         = {2022},
  url          = {https://doi.org/10.3390/bdcc6040101},
  doi          = {10.3390/BDCC6040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bdcc/RamachandraRLDB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhengWT22,
  author       = {Lijuan Zheng and
                  Zihan Wang and
                  Senping Tian},
  title        = {Comparative study on electrocardiogram encryption using elliptic curves
                  cryptography and data encryption standard for applications in Internet
                  of medical things},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {9},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.5776},
  doi          = {10.1002/CPE.5776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ZhengWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/GaripcanE22,
  author       = {Ali Murat Garipcan and
                  Ebubekir Erdem},
  title        = {{DESSB-TRNG:} {A} novel true random number generator using data encryption
                  standard substitution box as post-processing},
  journal      = {Digit. Signal Process.},
  volume       = {123},
  pages        = {103455},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dsp.2022.103455},
  doi          = {10.1016/J.DSP.2022.103455},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/GaripcanE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AkbalBDTA22,
  author       = {Erhan Akbal and
                  Prabal Datta Barua and
                  Seng{\"{u}}l Dogan and
                  Turker Tuncer and
                  U. Rajendra Acharya},
  title        = {DesPatNet25: Data encryption standard cipher model for accurate automated
                  construction site monitoring with sound signals},
  journal      = {Expert Syst. Appl.},
  volume       = {193},
  pages        = {116447},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2021.116447},
  doi          = {10.1016/J.ESWA.2021.116447},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AkbalBDTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/AhmedG22,
  author       = {Quazi Warisha Ahmed and
                  Shruti Garg},
  title        = {Double Diagonal Puzzle Encryption Standard-512 for Securing Data over
                  Cloud Environment},
  journal      = {J. Grid Comput.},
  volume       = {20},
  number       = {3},
  pages        = {33},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10723-022-09612-3},
  doi          = {10.1007/S10723-022-09612-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/AhmedG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BianPW22,
  author       = {Dongliang Bian and
                  Jun Pan and
                  Yanhui Wang},
  title        = {Study of Encrypted Transmission of Private Data During Network Communication:
                  Performance Comparison of Advanced Encryption Standard and Data Encryption
                  Standard Algorithms},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {5},
  pages        = {713--726},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1154},
  doi          = {10.13052/JCSM2245-1439.1154},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BianPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/22/DiffieH22a,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  editor       = {Rebecca Slayton},
  title        = {Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard},
  booktitle    = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin
                  Hellman},
  series       = {{ACM} Books},
  volume       = {42},
  pages        = {391--414},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3549993.3550008},
  doi          = {10.1145/3549993.3550008},
  timestamp    = {Thu, 21 Sep 2023 15:19:45 +0200},
  biburl       = {https://dblp.org/rec/books/acm/22/DiffieH22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/DworakB21,
  author       = {Kamil Dworak and
                  Urszula Boryczka},
  title        = {Breaking Data Encryption Standard with a Reduced Number of Rounds
                  Using Metaheuristics Differential Cryptanalysis},
  journal      = {Entropy},
  volume       = {23},
  number       = {12},
  pages        = {1697},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23121697},
  doi          = {10.3390/E23121697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/DworakB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/SheikhpourMB21,
  author       = {Saeide Sheikhpour and
                  Ali Mahani and
                  Nasour Bagheri},
  title        = {Reliable advanced encryption standard hardware implementation: 32-
                  bit and 64-bit data-paths},
  journal      = {Microprocess. Microsystems},
  volume       = {81},
  pages        = {103740},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.micpro.2020.103740},
  doi          = {10.1016/J.MICPRO.2020.103740},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/SheikhpourMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ArshadK21,
  author       = {Sadiqa Arshad and
                  Majid Khan},
  title        = {New extension of data encryption standard over 128-bit key for digital
                  images},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {20},
  pages        = {13845--13858},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-021-06023-5},
  doi          = {10.1007/S00521-021-06023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ArshadK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/webology/SunnyP21,
  author       = {Leya Elizabeth Sunny and
                  Varghese Paul},
  title        = {Enhancing Security in Digital Data using various Function of S-box
                  in Data Encryption Standard Method},
  journal      = {Webology},
  volume       = {18},
  number       = {2},
  pages        = {767--789},
  year         = {2021},
  url          = {https://doi.org/10.14704/web/v18i2/web18353},
  doi          = {10.14704/WEB/V18I2/WEB18353},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/webology/SunnyP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/AldolimiHA21,
  author       = {Wassan S. Aldolimi and
                  Adnan A. Hnaif and
                  Mohammad Ahmad Alia},
  title        = {Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard
                  Algorithm},
  booktitle    = {International Conference on Information Technology, {ICIT} 2021, Amman,
                  Jordan, July 14-15, 2021},
  pages        = {963--967},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICIT52682.2021.9491769},
  doi          = {10.1109/ICIT52682.2021.9491769},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/AldolimiHA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/Chen21c,
  title        = {Accounting Data Encryption Processing Based on Data Encryption Standard
                  Algorithm},
  journal      = {Complex.},
  volume       = {2021},
  pages        = {7212688:1--7212688:12},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2021/7212688},
  doi          = {10.1155/2021/7212688},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/Chen21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/IndiraRK21,
  title        = {{R2R-CSES:} proactive security data process using random round crypto
                  security encryption standard in cloud environment},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {4643--4654},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s12652-020-01860-z},
  doi          = {10.1007/S12652-020-01860-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/IndiraRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TengLYS20,
  author       = {Lin Teng and
                  Hang Li and
                  Shoulin Yin and
                  Yang Sun},
  title        = {A Modified Advanced Encryption Standard for Data Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {112--117},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p112-117.pdf},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TengLYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/AlaniAN20,
  author       = {Mohammed M. Alani and
                  Muath Alrammal and
                  Munir Naveed},
  title        = {Implementing IoT Lottery on Data Encryption Standard},
  journal      = {J. Commun.},
  volume       = {15},
  number       = {10},
  pages        = {735--740},
  year         = {2020},
  url          = {https://doi.org/10.12720/jcm.15.10.735-740},
  doi          = {10.12720/JCM.15.10.735-740},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/AlaniAN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AkandeAKAO20,
  author       = {Noah Oluwatobi Akande and
                  Oluwakemi Christiana Abikoye and
                  Anthonia Aderonke Kayode and
                  Oladele Taye Aro and
                  Roseline Oluwaseun Ogundokun},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Chiara Garau and
                  Ivan Blecic and
                  David Taniar and
                  Bernady O. Apduhan and
                  Ana Maria A. C. Rocha and
                  Eufemia Tarantino and
                  Carmelo Maria Torre and
                  Yeliz Karaca},
  title        = {A Dynamic Round Triple Data Encryption Standard Cryptographic Technique
                  for Data Security},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2020 - 20th International
                  Conference, Cagliari, Italy, July 1-4, 2020, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12254},
  pages        = {487--499},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58817-5\_36},
  doi          = {10.1007/978-3-030-58817-5\_36},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AkandeAKAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SartakhtiJ19,
  author       = {Javad Salimi Sartakhti and
                  Saeed Jalili},
  title        = {On the computational power of the light: {A} plan for breaking data
                  encryption standard},
  journal      = {Theor. Comput. Sci.},
  volume       = {773},
  pages        = {71--78},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.08.015},
  doi          = {10.1016/J.TCS.2018.08.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SartakhtiJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/YangW17,
  author       = {Xiaokun Yang and
                  Wujie Wen},
  title        = {Design of a pre-scheduled data bus for advanced encryption standard
                  encrypted system-on-chips},
  booktitle    = {22nd Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2017, Chiba, Japan, January 16-19, 2017},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASPDAC.2017.7858373},
  doi          = {10.1109/ASPDAC.2017.7858373},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/YangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcsa/UskovBH16,
  author       = {Alexander Uskov and
                  Adam Byerly and
                  Colleen Heinemann},
  title        = {Advanced Encryption Standard Analysis with Multimedia Data on Intel{\textregistered}
                  {AES-NI} Architecture},
  journal      = {Int. J. Comput. Sci. Appl.},
  volume       = {13},
  number       = {2},
  pages        = {89--105},
  year         = {2016},
  url          = {http://www.tmrfindia.org/ijcsa/v13i26.pdf},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcsa/UskovBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ClavierR16,
  author       = {Christophe Clavier and
                  Djamal Rebaine},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption
                  Standard},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {355--373},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_22},
  doi          = {10.1007/978-3-662-49301-4\_22},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ClavierR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZibidehM15,
  author       = {Walid Y. Zibideh and
                  Mustafa M. Matalgah},
  title        = {Modified data encryption standard encryption algorithm with improved
                  error performance and enhanced security in wireless fading channels},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {565--573},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1003},
  doi          = {10.1002/SEC.1003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZibidehM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/KimB15,
  author       = {Junghwan Kim and
                  Srinvasa R. Basavarasu},
  title        = {On the voice and image data encryption using advanced encryption standard
                  {(AES)} in counter mode for multimedia broadcasting},
  booktitle    = {2015 {IEEE} International Symposium on Broadband Multimedia Systems
                  and Broadcasting, {BMSB} 2015, Ghent, Belgium, June 17-19, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/BMSB.2015.7177191},
  doi          = {10.1109/BMSB.2015.7177191},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsb/KimB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icm2/OukiliB15,
  author       = {Soufiane Oukili and
                  Seddik Bri},
  title        = {{FPGA} implementation of Data Encryption Standard using time variable
                  permutations},
  booktitle    = {27th International Conference on Microelectronics, {ICM} 2015, Casablanca,
                  Morocco, December 20-23, 2015},
  pages        = {126--129},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICM.2015.7438004},
  doi          = {10.1109/ICM.2015.7438004},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icm2/OukiliB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/Serwe15,
  author       = {Wendelin Serwe},
  editor       = {Rob J. van Glabbeek and
                  Jan Friso Groote and
                  Peter H{\"{o}}fner},
  title        = {Formal Specification and Verification of Fully Asynchronous Implementations
                  of the Data Encryption Standard},
  booktitle    = {Proceedings Workshop on Models for Formal Analysis of Real Systems,
                  {MARS} 2015, Suva, Fiji, November 23, 2015},
  series       = {{EPTCS}},
  volume       = {196},
  pages        = {61--147},
  year         = {2015},
  url          = {https://doi.org/10.4204/EPTCS.196.6},
  doi          = {10.4204/EPTCS.196.6},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Serwe15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TeytaudF14,
  author       = {Fabien Teytaud and
                  Cyril Fonlupt},
  title        = {A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis
                  of the simplified data encryption standard algorithm},
  journal      = {CoRR},
  volume       = {abs/1407.1993},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.1993},
  eprinttype    = {arXiv},
  eprint       = {1407.1993},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TeytaudF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/ShanCLCLGS13,
  author       = {Weiwei Shan and
                  Xin Chen and
                  Bo Li and
                  Peng Cao and
                  Jie Li and
                  Gugang Gao and
                  Longxing Shi},
  title        = {Evaluation of Correlation Power Analysis Resistance and Its Application
                  on Asymmetric Mask Protected Data Encryption Standard Hardware},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {62},
  number       = {10},
  pages        = {2716--2724},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIM.2013.2259754},
  doi          = {10.1109/TIM.2013.2259754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/ShanCLCLGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fm/OkazakiS12,
  author       = {Hiroyuki Okazaki and
                  Yasunari Shidama},
  title        = {Formalization of the Data Encryption Standard},
  journal      = {Formaliz. Math.},
  volume       = {20},
  number       = {2},
  pages        = {125--146},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10037-012-0016-y},
  doi          = {10.2478/V10037-012-0016-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fm/OkazakiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/AlallayahAAA12,
  author       = {Khaled M. Alallayah and
                  Alaa H. Alhamami and
                  Waiel AbdElwahed and
                  Mohamed Amin},
  title        = {Applying neural networks for simplified data encryption standard {(SDES)}
                  cipher system cryptanalysis},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {9},
  number       = {2},
  pages        = {163--169},
  year         = {2012},
  url          = {http://iajit.org/index.php?option=com\_content\&task=blogcategory\&id=79\&Itemid=324},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/AlallayahAAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/SisonTGB11,
  author       = {Ariel M. Sison and
                  Bartolome T. Tanguilig III and
                  Bobby D. Gerardo and
                  Yung{-}Cheol Byun},
  title        = {An Improved Data Encryption Standard to Secure Data Using Smart Cards},
  booktitle    = {9th International Conference on Software Engineering Research, Management
                  and Applications, {SERA} 2011, Baltimore, MD, USA, August 10-12, 2011},
  pages        = {113--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SERA.2011.27},
  doi          = {10.1109/SERA.2011.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sera/SisonTGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BiryukovC11,
  author       = {Alex Biryukov and
                  Christophe De Canni{\`{e}}re},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Data Encryption Standard {(DES)}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {295--301},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_568},
  doi          = {10.1007/978-1-4419-5906-5\_568},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BiryukovC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/TaherkhaniEG10,
  author       = {Saeid Taherkhani and
                  Enver Ever and
                  Orhan Gemikonakli},
  title        = {Implementation of Non-Pipelined and Pipelined Data Encryption Standard
                  {(DES)} Using Xilinx Virtex-6 {FPGA} Technology},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1257--1262},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.227},
  doi          = {10.1109/CIT.2010.227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/TaherkhaniEG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisim/GhnaimGH10,
  author       = {Wafaa Abd{-}Elmonim Ghnaim and
                  Neveen I. Ghali and
                  Aboul Ella Hassanien},
  title        = {Known-ciphertext cryptanalysis approach for the Data Encryption Standard
                  technique},
  booktitle    = {2010 International Conference on Computer Information Systems and
                  Industrial Management Applications, CISIM, Krakow, Poland, October
                  8-10, 2010},
  pages        = {600--603},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISIM.2010.5643521},
  doi          = {10.1109/CISIM.2010.5643521},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/cisim/GhnaimGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/Chang10,
  author       = {Weng{-}Long Chang},
  title        = {Fast Quantum Algorithms of Breaking the Data Encryption Standard},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2010, Taipei, Taiwan, 6-9 September 2010},
  pages        = {520--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISPA.2010.27},
  doi          = {10.1109/ISPA.2010.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/Chang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-0574,
  author       = {Poonam Garg},
  title        = {A Comparison between Memetic algorithm and Genetic algorithm for the
                  cryptanalysis of Simplified Data Encryption Standard algorithm},
  journal      = {CoRR},
  volume       = {abs/1004.0574},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.0574},
  eprinttype    = {arXiv},
  eprint       = {1004.0574},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-0574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/ChoudharyK09,
  author       = {Ashish Choudhary and
                  Kamala Krithivasan},
  title        = {Breaking the data encryption standard using networks of evolutionary
                  processors with parallel string rewriting rules},
  journal      = {Int. J. Comput. Math.},
  volume       = {86},
  number       = {4},
  pages        = {567--576},
  year         = {2009},
  url          = {https://doi.org/10.1080/00207160701351168},
  doi          = {10.1080/00207160701351168},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/ChoudharyK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icistm/VermaP09,
  author       = {Jatin Verma and
                  Sunita Prasad},
  editor       = {Sushil K. Prasad and
                  Susmi Routray and
                  Reema Khurana and
                  Sartaj Sahni},
  title        = {Security Enhancement in Data Encryption Standard},
  booktitle    = {Information Systems, Technology and Management - Third International
                  Conference, {ICISTM} 2009, Ghaziabad, India, March 12-13, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {31},
  pages        = {325--334},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00405-6\_34},
  doi          = {10.1007/978-3-642-00405-6\_34},
  timestamp    = {Fri, 02 Nov 2018 09:44:37 +0100},
  biburl       = {https://dblp.org/rec/conf/icistm/VermaP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-0216,
  author       = {A. W. Naji and
                  Shihab A. Hameed and
                  B. B. Zaidan and
                  Wajdi F. Al{-}Khateeb and
                  Othman O. Khalifa and
                  A. A. Zaidan and
                  Teddy Surya Gunawan},
  title        = {Novel Framework for Hidden Data in the Image Page within Executable
                  File Using Computation between Advanced Encryption Standard and Distortion
                  Techniques},
  journal      = {CoRR},
  volume       = {abs/0908.0216},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.0216},
  eprinttype    = {arXiv},
  eprint       = {0908.0216},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-0216.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/PoonamA08,
  author       = {Poonam Garg and
                  Atul Garg},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Memetic {\&} Genetic Algorithms: {A} Comparison between two approaches
                  for the cryptanalysis of Simplified Data Encryption Standard algorithm},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {443--448},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Fri, 13 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/PoonamA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mm/X08bj,
  editor       = {Borko Furht},
  title        = {Data Encryption Standard {(DES)} and Advanced Encryption Standard
                  {(AES)}},
  booktitle    = {Encyclopedia of Multimedia, 2nd Ed},
  pages        = {135--136},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-78414-4\_287},
  doi          = {10.1007/978-0-387-78414-4\_287},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/mm/X08bj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/Phan07a,
  author       = {Raphael C.{-}W. Phan},
  title        = {Reducing the exhaustive key search of the Data Encryption Standard
                  {(DES)}},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {5},
  pages        = {528--530},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.11.010},
  doi          = {10.1016/J.CSI.2006.11.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/Phan07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/Kanavathy07,
  author       = {Therverson Kanavathy},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Laurence Tianruo Yang},
  title        = {Security Flaws in {WEP} Data Encryption Standard},
  booktitle    = {Proceedings of the 2007 International Conference on Wireless Networks,
                  June 25-28, 2007, Las Vegas, Nevada, {USA}},
  pages        = {199--208},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Mon, 09 Feb 2009 10:38:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/Kanavathy07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CourtoisB07,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard},
  editor       = {Steven D. Galbraith},
  title        = {Algebraic Cryptanalysis of the Data Encryption Standard},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {152--169},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_10},
  doi          = {10.1007/978-3-540-77272-9\_10},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/CourtoisB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mm/X06ag,
  editor       = {Borko Furht},
  title        = {Data Encryption Standard {(DES)} and Advanced Encryption Standard
                  {(AES)}},
  booktitle    = {Encyclopedia of Multimedia},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-30038-4\_46},
  doi          = {10.1007/0-387-30038-4\_46},
  timestamp    = {Wed, 26 Jun 2019 12:55:10 +0200},
  biburl       = {https://dblp.org/rec/reference/mm/X06ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisB06,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard},
  title        = {Algebraic Cryptanalysis of the Data Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/402},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4772,
  author       = {Scott G. Kelly},
  title        = {Security Implications of Using the Data Encryption Standard {(DES)}},
  journal      = {{RFC}},
  volume       = {4772},
  pages        = {1--28},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4772},
  doi          = {10.17487/RFC4772},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/05/BeletskyyB05,
  author       = {Volodymyr Beletskyy and
                  D. Burak},
  editor       = {Jerzy Pejas and
                  Andrzej Piegat},
  title        = {Parallelization of the Data Encryption Standard {(DES)} algorithm},
  booktitle    = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
                  Systems},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23484-5\_3},
  doi          = {10.1007/0-387-23484-5\_3},
  timestamp    = {Thu, 24 Jan 2019 18:24:48 +0100},
  biburl       = {https://dblp.org/rec/books/sp/05/BeletskyyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BiryukovC05,
  author       = {Alex Biryukov and
                  Christophe De Canni{\`{e}}re},
  editor       = {Henk C. A. van Tilborg},
  title        = {Data encryption standard {(DES)}},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_94},
  doi          = {10.1007/0-387-23483-7\_94},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BiryukovC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/polibits/GarciaEV04,
  author       = {V{\'{\i}}ctor Manuel Silva Garc{\'{\i}}a and
                  Eduardo Rodr{\'{\i}}guez Escobar and
                  Eduardo Vega{-}Alvarado},
  title        = {Criptograf{\'{\i}}a: Data Encryption Standard},
  journal      = {Polibits},
  volume       = {30},
  pages        = {3--5},
  year         = {2004},
  url          = {https://doi.org/10.17562/PB-30-1},
  doi          = {10.17562/PB-30-1},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/polibits/GarciaEV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/YangWK04,
  author       = {Bo Yang and
                  Kaijie Wu and
                  Ramesh Karri},
  title        = {Scan Based Side Channel Attack on Dedicated Hardware Implementations
                  of Data Encryption Standard},
  booktitle    = {Proceedings 2004 International Test Conference {(ITC} 2004), October
                  26-28, 2004, Charlotte, NC, {USA}},
  pages        = {339--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/TEST.2004.1386969},
  doi          = {10.1109/TEST.2004.1386969},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itc/YangWK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWK04,
  author       = {Bo Yang and
                  Kaijie Wu and
                  Ramesh Karri},
  title        = {Scan Based Side Channel Attack on Data Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/083},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pppj/LoughranD03,
  author       = {John Loughran and
                  Tom Dowling},
  editor       = {James F. Power and
                  John Waldron},
  title        = {A Java implemented key collision attack on the data encryption standard
                  {(DES)}},
  booktitle    = {Proceedings of the 2nd International Symposium on Principles and Practice
                  of Programming in Java, {PPPJ} 2003, Kilkenny City, Ireland, June
                  16-18, 2003},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {42},
  pages        = {155--157},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://dl.acm.org/citation.cfm?id=957335},
  timestamp    = {Mon, 26 Nov 2018 15:05:58 +0100},
  biburl       = {https://dblp.org/rec/conf/pppj/LoughranD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3537,
  author       = {Jim Schaad and
                  Russell Housley},
  title        = {Wrapping a Hashed Message Authentication Code {(HMAC)} key with a
                  Triple-Data Encryption Standard {(DES)} Key or an Advanced Encryption
                  Standard {(AES)} Key},
  journal      = {{RFC}},
  volume       = {3537},
  pages        = {1--9},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3537},
  doi          = {10.17487/RFC3537},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3537.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox00g,
  author       = {Dirk Fox},
  title        = {Data Encryption Standard {(DES)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {24},
  number       = {12},
  year         = {2000},
  timestamp    = {Fri, 12 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox00g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KapsP99,
  author       = {Jens{-}Peter Kaps and
                  Christof Paar},
  title        = {{DES} auf FPGAs - Hochgeschwindigkeits-Architekturen f{\"{u}}r
                  den Data Encryption Standard auf rekonfigurierbarer Hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {23},
  number       = {9},
  year         = {1999},
  timestamp    = {Thu, 18 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KapsP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/AdlemanRRW99,
  author       = {Leonard M. Adleman and
                  Paul W. K. Rothemund and
                  Sam T. Roweis and
                  Erik Winfree},
  title        = {On Applying Molecular Computation to the Data Encryption Standard},
  journal      = {J. Comput. Biol.},
  volume       = {6},
  number       = {1},
  pages        = {53--63},
  year         = {1999},
  url          = {https://doi.org/10.1089/cmb.1999.6.53},
  doi          = {10.1089/CMB.1999.6.53},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcb/AdlemanRRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HeviaK99,
  author       = {Alejandro Hevia and
                  Marcos A. Kiwi},
  title        = {Strength of two data encryption standard implementations under timing
                  attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {416--437},
  year         = {1999},
  url          = {https://doi.org/10.1145/330382.330390},
  doi          = {10.1145/330382.330390},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HeviaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/HeviaK98,
  author       = {Alejandro Hevia and
                  Marcos A. Kiwi},
  editor       = {Claudio L. Lucchesi and
                  Arnaldo V. Moura},
  title        = {Strength of Two Data Encryption Standard Implementations under Timing
                  Attacks},
  booktitle    = {{LATIN} '98: Theoretical Informatics, Third Latin American Symposium,
                  Campinas, Brazil, April, 20-24, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1380},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054321},
  doi          = {10.1007/BFB0054321},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/latin/HeviaK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CoppersmithHMZ97,
  author       = {Don Coppersmith and
                  Chris L. Holloway and
                  Stephen M. Matyas and
                  Nevenko Zunic},
  title        = {The data encryption standard},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {2},
  number       = {2},
  pages        = {22--24},
  year         = {1997},
  url          = {https://doi.org/10.1016/S1363-4127(97)81325-8},
  doi          = {10.1016/S1363-4127(97)81325-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CoppersmithHMZ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schaefer96,
  author       = {Edward F. Schaefer},
  title        = {A Simplified Data Encryption Standard Algorithm},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {77--84},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884799},
  doi          = {10.1080/0161-119691884799},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schaefer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/AdlemanRRW96,
  author       = {Leonard M. Adleman and
                  Paul W. K. Rothemund and
                  Sam T. Roweis and
                  Erik Winfree},
  editor       = {Laura F. Landweber and
                  Eric B. Baum},
  title        = {On applying molecular computation to the data encryption standard},
  booktitle    = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
                  New Jersey, USA, June 10-12, 1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {44},
  pages        = {31--44},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/044/02},
  doi          = {10.1090/DIMACS/044/02},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/AdlemanRRW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Shepherd95,
  author       = {Simon J. Shepherd},
  title        = {A high speed software implementation of the Data Encryption Standard},
  journal      = {Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {349--357},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-4048(95)00007-U},
  doi          = {10.1016/0167-4048(95)00007-U},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Shepherd95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/Coppersmith94,
  author       = {Don Coppersmith},
  title        = {The Data Encryption Standard {(DES)} and its strength against attacks},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {38},
  number       = {3},
  pages        = {243--250},
  year         = {1994},
  url          = {https://doi.org/10.1147/rd.383.0243},
  doi          = {10.1147/RD.383.0243},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/Coppersmith94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CarterCN94,
  author       = {Gary Carter and
                  Andrew J. Clark and
                  Lauren Nielsen},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {{DESV-1:} {A} Variation of the Data Encryption Standard {(DES)}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {427--430},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000455},
  doi          = {10.1007/BFB0000455},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CarterCN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Matsui94,
  author       = {Mitsuru Matsui},
  editor       = {Yvo Desmedt},
  title        = {The First Experimental Cryptanalysis of the Data Encryption Standard},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_1},
  doi          = {10.1007/3-540-48658-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Matsui94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0032320,
  author       = {Eli Biham and
                  Adi Shamir},
  title        = {Differential Cryptanalysis of the Data Encryption Standard},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-1-4613-9314-6},
  doi          = {10.1007/978-1-4613-9314-6},
  isbn         = {978-1-4613-9316-0},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0032320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus92e,
  author       = {Belden Menkus},
  title        = {Re-examining the Data Encryption Standard},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {8},
  pages        = {703--706},
  year         = {1992},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus92e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GaronO91,
  author       = {Gilles Garon and
                  Richard Outerbridge},
  title        = {Des Watch: an Examination of the Sufficiency of the Data Encryption
                  Standard for Financial Institution Information Security in the 1990's},
  journal      = {Cryptologia},
  volume       = {15},
  number       = {3},
  pages        = {177--193},
  year         = {1991},
  url          = {https://doi.org/10.1080/0161-119191865849},
  doi          = {10.1080/0161-119191865849},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GaronO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csys/Bishop88,
  author       = {Matt Bishop},
  title        = {An Application of a Fast Data Encryption Standard Implementation},
  journal      = {Comput. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {221--254},
  year         = {1988},
  url          = {http://www.usenix.org/publications/compsystems/1988/sum\_bishop.pdf},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csys/Bishop88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KaliskiRS88,
  author       = {Burton S. Kaliski Jr. and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Is the Data Encryption Standard a Group? (Results of Cycling Experiments
                  on {DES)}},
  journal      = {J. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {3--36},
  year         = {1988},
  url          = {https://doi.org/10.1007/BF00206323},
  doi          = {10.1007/BF00206323},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KaliskiRS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/SmidB88,
  author       = {Miles E. Smid and
                  Dennis K. Branstad},
  title        = {Data Encryption Standard: past and future},
  journal      = {Proc. {IEEE}},
  volume       = {76},
  number       = {5},
  pages        = {550--559},
  year         = {1988},
  url          = {https://doi.org/10.1109/5.4441},
  doi          = {10.1109/5.4441},
  timestamp    = {Fri, 09 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/SmidB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland87k,
  author       = {Harold Joseph Highland},
  title        = {Data encryption standard II?},
  journal      = {Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {195--196},
  year         = {1987},
  url          = {https://doi.org/10.1016/0167-4048(87)90095-2},
  doi          = {10.1016/0167-4048(87)90095-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland87k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KaliskiRS85,
  author       = {Burton S. Kaliski Jr. and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  editor       = {Franz Pichler},
  title        = {Is the Data Encryption Standard a Group? (Preliminary Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Linz, Austria, April 1985,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {219},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39805-8\_10},
  doi          = {10.1007/3-540-39805-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KaliskiRS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Krause84,
  author       = {Lothar Krause},
  title        = {Data encryption in ISO, the International Organization for Standardization},
  journal      = {Comput. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {234--236},
  year         = {1984},
  url          = {https://doi.org/10.1016/0167-4048(84)90045-2},
  doi          = {10.1016/0167-4048(84)90045-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Krause84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Schaumuller-Bichl82,
  author       = {Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Zur Analyse des Data encryption standard und Synthese verwandter Chiffriersysteme},
  school       = {Johannes Kepler University Linz, Austria},
  year         = {1982},
  url          = {https://d-nb.info/820984949},
  isbn         = {978-3-85369-521-0},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Schaumuller-Bichl82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Davies82,
  author       = {Donald W. Davies},
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Some Regular Properties of the 'Data Encryption Standard' Algorithm},
  booktitle    = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  pages        = {89--96},
  publisher    = {Plenum Press, New York},
  year         = {1982},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4\_8},
  doi          = {10.1007/978-1-4757-0602-4\_8},
  timestamp    = {Thu, 25 Jul 2019 12:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Davies82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Schaumuller-Bich82,
  author       = {Ingrid Schaum{\"{u}}ller{-}Bichl},
  editor       = {Thomas Beth},
  title        = {Cryptonalysis of the Data Encryption Standard by the Method of Formal
                  Coding},
  booktitle    = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein,
                  Germany, March 29 - April 2, 1982},
  series       = {Lecture Notes in Computer Science},
  volume       = {149},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {1982},
  url          = {https://doi.org/10.1007/3-540-39466-4\_17},
  doi          = {10.1007/3-540-39466-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Schaumuller-Bich82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/Smid81,
  author       = {Miles E. Smid},
  title        = {Integrating the Data Encryption Standard into Computer Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {29},
  number       = {6},
  pages        = {762--772},
  year         = {1981},
  url          = {https://doi.org/10.1109/TCOM.1981.1095071},
  doi          = {10.1109/TCOM.1981.1095071},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/Smid81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmsj/EhrsamMMT78,
  author       = {William R. Ehrsam and
                  Stephen M. Matyas and
                  Carl H. Meyer and
                  Walter L. Tuchman},
  title        = {A Cryptographic Key Management Scheme for Implementing the Data Encryption
                  Standard},
  journal      = {{IBM} Syst. J.},
  volume       = {17},
  number       = {2},
  pages        = {106--125},
  year         = {1978},
  url          = {https://doi.org/10.1147/sj.172.0106},
  doi          = {10.1147/SJ.172.0106},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmsj/EhrsamMMT78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/afips/Meyer78,
  author       = {Carl H. Meyer},
  editor       = {Sakti P. Ghosh and
                  Leonard Y. Liu},
  title        = {Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds
                  for the data encryption standard},
  booktitle    = {American Federation of Information Processing Societies: 1978 National
                  Computer Conference, June 5-8, 1978, Anaheim, CA, {USA}},
  series       = {{AFIPS} Conference Proceedings},
  volume       = {47},
  pages        = {1119--1126},
  publisher    = {{AFIPS} Press},
  year         = {1978},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/afips/Meyer78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DiffieH77,
  author       = {Whitfield Diffie and
                  Martin E. Hellman},
  title        = {Special Feature Exhaustive Cryptanalysis of the {NBS} Data Encryption
                  Standard},
  journal      = {Computer},
  volume       = {10},
  number       = {6},
  pages        = {74--84},
  year         = {1977},
  url          = {https://doi.org/10.1109/C-M.1977.217750},
  doi          = {10.1109/C-M.1977.217750},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DiffieH77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MorrisSW77,
  author       = {Robert H. Morris Sr. and
                  Neil J. A. Sloane and
                  Aaron D. Wyner},
  title        = {Assessment of the National Bureau of Standards Proposed Federal Data
                  Encryption Standard},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {281--291},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833020},
  doi          = {10.1080/0161-117791833020},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MorrisSW77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics