Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "data encryption standard"
@article{DBLP:journals/elektrik/Kara24, author = {Orhun Kara}, title = {Lower data attacks on Advanced Encryption Standard}, journal = {Turkish J. Electr. Eng. Comput. Sci.}, volume = {32}, number = {2}, pages = {338--357}, year = {2024}, url = {https://doi.org/10.55730/1300-0632.4072}, doi = {10.55730/1300-0632.4072}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/elektrik/Kara24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/MoreP24, author = {Kiran P. More and Rajendrakumar A. Patil}, title = {A modified advanced encryption standard-based model for secured data transmission in cognitive radio with multi-channels}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {26}, number = {3}, pages = {238--250}, year = {2024}, url = {https://doi.org/10.1504/IJWMC.2024.137832}, doi = {10.1504/IJWMC.2024.137832}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/MoreP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiXZLZ24, author = {Biaoqi Li and Min Xu and Yuan Zhou and Haibin Liu and Renlong Zhang}, title = {Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {239--264}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1323}, doi = {10.13052/JCSM2245-1439.1323}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LiXZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kara24, author = {Orhun Kara}, title = {Lower data attacks on Advanced Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2024}, url = {https://eprint.iacr.org/2024/483}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kara24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/X23w, title = {Retracted: Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm}, journal = {Complex.}, volume = {2023}, pages = {9856582:1--9856582:1}, year = {2023}, url = {https://doi.org/10.1155/2023/9856582}, doi = {10.1155/2023/9856582}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/X23w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/AlhazaimehABN23, author = {Obaida M. Al{-}hazaimeh and Moy'awiah Al{-}Shannaq and Mohammed J. Bawaneh and Khalid M. O. Nahar}, title = {Analytical Approach for Data Encryption Standard Algorithm}, journal = {Int. J. Interact. Mob. Technol.}, volume = {17}, number = {14}, pages = {126--143}, year = {2023}, url = {https://doi.org/10.3991/ijim.v17i14.38641}, doi = {10.3991/IJIM.V17I14.38641}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/AlhazaimehABN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icce-tw/KawanoPAK23, author = {Maki Kawano and Shihcheng Peng and Shunsuke Araki and Ken'ichi Kakizaki}, title = {A Study on Guessing plaintexts by Neural Network against Data Encryption Standard {(DES)}}, booktitle = {International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023, PingTung, Taiwan, July 17-19, 2023}, pages = {531--532}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226974}, doi = {10.1109/ICCE-TAIWAN58799.2023.10226974}, timestamp = {Fri, 08 Sep 2023 15:28:17 +0200}, biburl = {https://dblp.org/rec/conf/icce-tw/KawanoPAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-05530, author = {Ruby Kumari and Jai Gopal Pandey and Abhijit Karmakar}, title = {An {RTL} Implementation of the Data Encryption Standard {(DES)}}, journal = {CoRR}, volume = {abs/2301.05530}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.05530}, doi = {10.48550/ARXIV.2301.05530}, eprinttype = {arXiv}, eprint = {2301.05530}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-05530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/RamachandraRLDB22, author = {Mohan Naik Ramachandra and Madala Srinivasa Rao and Wen{-}Cheng Lai and Parameshachari Bidare Divakarachari and Jayachandra Ananda Babu and Hemalatha Kivudujogappa Lingappa}, title = {An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard}, journal = {Big Data Cogn. Comput.}, volume = {6}, number = {4}, pages = {101}, year = {2022}, url = {https://doi.org/10.3390/bdcc6040101}, doi = {10.3390/BDCC6040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bdcc/RamachandraRLDB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhengWT22, author = {Lijuan Zheng and Zihan Wang and Senping Tian}, title = {Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {9}, year = {2022}, url = {https://doi.org/10.1002/cpe.5776}, doi = {10.1002/CPE.5776}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ZhengWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/GaripcanE22, author = {Ali Murat Garipcan and Ebubekir Erdem}, title = {{DESSB-TRNG:} {A} novel true random number generator using data encryption standard substitution box as post-processing}, journal = {Digit. Signal Process.}, volume = {123}, pages = {103455}, year = {2022}, url = {https://doi.org/10.1016/j.dsp.2022.103455}, doi = {10.1016/J.DSP.2022.103455}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/GaripcanE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AkbalBDTA22, author = {Erhan Akbal and Prabal Datta Barua and Seng{\"{u}}l Dogan and Turker Tuncer and U. Rajendra Acharya}, title = {DesPatNet25: Data encryption standard cipher model for accurate automated construction site monitoring with sound signals}, journal = {Expert Syst. Appl.}, volume = {193}, pages = {116447}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2021.116447}, doi = {10.1016/J.ESWA.2021.116447}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AkbalBDTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/AhmedG22, author = {Quazi Warisha Ahmed and Shruti Garg}, title = {Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment}, journal = {J. Grid Comput.}, volume = {20}, number = {3}, pages = {33}, year = {2022}, url = {https://doi.org/10.1007/s10723-022-09612-3}, doi = {10.1007/S10723-022-09612-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/AhmedG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BianPW22, author = {Dongliang Bian and Jun Pan and Yanhui Wang}, title = {Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {5}, pages = {713--726}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1154}, doi = {10.13052/JCSM2245-1439.1154}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BianPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/22/DiffieH22a, author = {Whitfield Diffie and Martin E. Hellman}, editor = {Rebecca Slayton}, title = {Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard}, booktitle = {Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman}, series = {{ACM} Books}, volume = {42}, pages = {391--414}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549993.3550008}, doi = {10.1145/3549993.3550008}, timestamp = {Thu, 21 Sep 2023 15:19:45 +0200}, biburl = {https://dblp.org/rec/books/acm/22/DiffieH22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/DworakB21, author = {Kamil Dworak and Urszula Boryczka}, title = {Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis}, journal = {Entropy}, volume = {23}, number = {12}, pages = {1697}, year = {2021}, url = {https://doi.org/10.3390/e23121697}, doi = {10.3390/E23121697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/DworakB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/SheikhpourMB21, author = {Saeide Sheikhpour and Ali Mahani and Nasour Bagheri}, title = {Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths}, journal = {Microprocess. Microsystems}, volume = {81}, pages = {103740}, year = {2021}, url = {https://doi.org/10.1016/j.micpro.2020.103740}, doi = {10.1016/J.MICPRO.2020.103740}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/SheikhpourMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ArshadK21, author = {Sadiqa Arshad and Majid Khan}, title = {New extension of data encryption standard over 128-bit key for digital images}, journal = {Neural Comput. Appl.}, volume = {33}, number = {20}, pages = {13845--13858}, year = {2021}, url = {https://doi.org/10.1007/s00521-021-06023-5}, doi = {10.1007/S00521-021-06023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ArshadK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/webology/SunnyP21, author = {Leya Elizabeth Sunny and Varghese Paul}, title = {Enhancing Security in Digital Data using various Function of S-box in Data Encryption Standard Method}, journal = {Webology}, volume = {18}, number = {2}, pages = {767--789}, year = {2021}, url = {https://doi.org/10.14704/web/v18i2/web18353}, doi = {10.14704/WEB/V18I2/WEB18353}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/webology/SunnyP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/AldolimiHA21, author = {Wassan S. Aldolimi and Adnan A. Hnaif and Mohammad Ahmad Alia}, title = {Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard Algorithm}, booktitle = {International Conference on Information Technology, {ICIT} 2021, Amman, Jordan, July 14-15, 2021}, pages = {963--967}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICIT52682.2021.9491769}, doi = {10.1109/ICIT52682.2021.9491769}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cit/AldolimiHA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/Chen21c, title = {Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm}, journal = {Complex.}, volume = {2021}, pages = {7212688:1--7212688:12}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2021/7212688}, doi = {10.1155/2021/7212688}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/Chen21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/IndiraRK21, title = {{R2R-CSES:} proactive security data process using random round crypto security encryption standard in cloud environment}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {5}, pages = {4643--4654}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s12652-020-01860-z}, doi = {10.1007/S12652-020-01860-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/IndiraRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TengLYS20, author = {Lin Teng and Hang Li and Shoulin Yin and Yang Sun}, title = {A Modified Advanced Encryption Standard for Data Security}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {1}, pages = {112--117}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p112-117.pdf}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TengLYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/AlaniAN20, author = {Mohammed M. Alani and Muath Alrammal and Munir Naveed}, title = {Implementing IoT Lottery on Data Encryption Standard}, journal = {J. Commun.}, volume = {15}, number = {10}, pages = {735--740}, year = {2020}, url = {https://doi.org/10.12720/jcm.15.10.735-740}, doi = {10.12720/JCM.15.10.735-740}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/AlaniAN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AkandeAKAO20, author = {Noah Oluwatobi Akande and Oluwakemi Christiana Abikoye and Anthonia Aderonke Kayode and Oladele Taye Aro and Roseline Oluwaseun Ogundokun}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Chiara Garau and Ivan Blecic and David Taniar and Bernady O. Apduhan and Ana Maria A. C. Rocha and Eufemia Tarantino and Carmelo Maria Torre and Yeliz Karaca}, title = {A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security}, booktitle = {Computational Science and Its Applications - {ICCSA} 2020 - 20th International Conference, Cagliari, Italy, July 1-4, 2020, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {12254}, pages = {487--499}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58817-5\_36}, doi = {10.1007/978-3-030-58817-5\_36}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AkandeAKAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SartakhtiJ19, author = {Javad Salimi Sartakhti and Saeed Jalili}, title = {On the computational power of the light: {A} plan for breaking data encryption standard}, journal = {Theor. Comput. Sci.}, volume = {773}, pages = {71--78}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.08.015}, doi = {10.1016/J.TCS.2018.08.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SartakhtiJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/YangW17, author = {Xiaokun Yang and Wujie Wen}, title = {Design of a pre-scheduled data bus for advanced encryption standard encrypted system-on-chips}, booktitle = {22nd Asia and South Pacific Design Automation Conference, {ASP-DAC} 2017, Chiba, Japan, January 16-19, 2017}, pages = {506--511}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ASPDAC.2017.7858373}, doi = {10.1109/ASPDAC.2017.7858373}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/YangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcsa/UskovBH16, author = {Alexander Uskov and Adam Byerly and Colleen Heinemann}, title = {Advanced Encryption Standard Analysis with Multimedia Data on Intel{\textregistered} {AES-NI} Architecture}, journal = {Int. J. Comput. Sci. Appl.}, volume = {13}, number = {2}, pages = {89--105}, year = {2016}, url = {http://www.tmrfindia.org/ijcsa/v13i26.pdf}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcsa/UskovBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ClavierR16, author = {Christophe Clavier and Djamal Rebaine}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {355--373}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_22}, doi = {10.1007/978-3-662-49301-4\_22}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ClavierR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZibidehM15, author = {Walid Y. Zibideh and Mustafa M. Matalgah}, title = {Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {565--573}, year = {2015}, url = {https://doi.org/10.1002/sec.1003}, doi = {10.1002/SEC.1003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZibidehM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/KimB15, author = {Junghwan Kim and Srinvasa R. Basavarasu}, title = {On the voice and image data encryption using advanced encryption standard {(AES)} in counter mode for multimedia broadcasting}, booktitle = {2015 {IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2015, Ghent, Belgium, June 17-19, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/BMSB.2015.7177191}, doi = {10.1109/BMSB.2015.7177191}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/KimB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icm2/OukiliB15, author = {Soufiane Oukili and Seddik Bri}, title = {{FPGA} implementation of Data Encryption Standard using time variable permutations}, booktitle = {27th International Conference on Microelectronics, {ICM} 2015, Casablanca, Morocco, December 20-23, 2015}, pages = {126--129}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICM.2015.7438004}, doi = {10.1109/ICM.2015.7438004}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icm2/OukiliB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/Serwe15, author = {Wendelin Serwe}, editor = {Rob J. van Glabbeek and Jan Friso Groote and Peter H{\"{o}}fner}, title = {Formal Specification and Verification of Fully Asynchronous Implementations of the Data Encryption Standard}, booktitle = {Proceedings Workshop on Models for Formal Analysis of Real Systems, {MARS} 2015, Suva, Fiji, November 23, 2015}, series = {{EPTCS}}, volume = {196}, pages = {61--147}, year = {2015}, url = {https://doi.org/10.4204/EPTCS.196.6}, doi = {10.4204/EPTCS.196.6}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Serwe15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TeytaudF14, author = {Fabien Teytaud and Cyril Fonlupt}, title = {A Critical Reassessment of Evolutionary Algorithms on the cryptanalysis of the simplified data encryption standard algorithm}, journal = {CoRR}, volume = {abs/1407.1993}, year = {2014}, url = {http://arxiv.org/abs/1407.1993}, eprinttype = {arXiv}, eprint = {1407.1993}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TeytaudF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/ShanCLCLGS13, author = {Weiwei Shan and Xin Chen and Bo Li and Peng Cao and Jie Li and Gugang Gao and Longxing Shi}, title = {Evaluation of Correlation Power Analysis Resistance and Its Application on Asymmetric Mask Protected Data Encryption Standard Hardware}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {62}, number = {10}, pages = {2716--2724}, year = {2013}, url = {https://doi.org/10.1109/TIM.2013.2259754}, doi = {10.1109/TIM.2013.2259754}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/ShanCLCLGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fm/OkazakiS12, author = {Hiroyuki Okazaki and Yasunari Shidama}, title = {Formalization of the Data Encryption Standard}, journal = {Formaliz. Math.}, volume = {20}, number = {2}, pages = {125--146}, year = {2012}, url = {https://doi.org/10.2478/v10037-012-0016-y}, doi = {10.2478/V10037-012-0016-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fm/OkazakiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/AlallayahAAA12, author = {Khaled M. Alallayah and Alaa H. Alhamami and Waiel AbdElwahed and Mohamed Amin}, title = {Applying neural networks for simplified data encryption standard {(SDES)} cipher system cryptanalysis}, journal = {Int. Arab J. Inf. Technol.}, volume = {9}, number = {2}, pages = {163--169}, year = {2012}, url = {http://iajit.org/index.php?option=com\_content\&task=blogcategory\&id=79\&Itemid=324}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/AlallayahAAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/SisonTGB11, author = {Ariel M. Sison and Bartolome T. Tanguilig III and Bobby D. Gerardo and Yung{-}Cheol Byun}, title = {An Improved Data Encryption Standard to Secure Data Using Smart Cards}, booktitle = {9th International Conference on Software Engineering Research, Management and Applications, {SERA} 2011, Baltimore, MD, USA, August 10-12, 2011}, pages = {113--118}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SERA.2011.27}, doi = {10.1109/SERA.2011.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sera/SisonTGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BiryukovC11, author = {Alex Biryukov and Christophe De Canni{\`{e}}re}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Data Encryption Standard {(DES)}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {295--301}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_568}, doi = {10.1007/978-1-4419-5906-5\_568}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BiryukovC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/TaherkhaniEG10, author = {Saeid Taherkhani and Enver Ever and Orhan Gemikonakli}, title = {Implementation of Non-Pipelined and Pipelined Data Encryption Standard {(DES)} Using Xilinx Virtex-6 {FPGA} Technology}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1257--1262}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.227}, doi = {10.1109/CIT.2010.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/TaherkhaniEG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/GhnaimGH10, author = {Wafaa Abd{-}Elmonim Ghnaim and Neveen I. Ghali and Aboul Ella Hassanien}, title = {Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique}, booktitle = {2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010}, pages = {600--603}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CISIM.2010.5643521}, doi = {10.1109/CISIM.2010.5643521}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/cisim/GhnaimGH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/Chang10, author = {Weng{-}Long Chang}, title = {Fast Quantum Algorithms of Breaking the Data Encryption Standard}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2010, Taipei, Taiwan, 6-9 September 2010}, pages = {520--527}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ISPA.2010.27}, doi = {10.1109/ISPA.2010.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/Chang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-0574, author = {Poonam Garg}, title = {A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm}, journal = {CoRR}, volume = {abs/1004.0574}, year = {2010}, url = {http://arxiv.org/abs/1004.0574}, eprinttype = {arXiv}, eprint = {1004.0574}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-0574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/ChoudharyK09, author = {Ashish Choudhary and Kamala Krithivasan}, title = {Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules}, journal = {Int. J. Comput. Math.}, volume = {86}, number = {4}, pages = {567--576}, year = {2009}, url = {https://doi.org/10.1080/00207160701351168}, doi = {10.1080/00207160701351168}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/ChoudharyK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icistm/VermaP09, author = {Jatin Verma and Sunita Prasad}, editor = {Sushil K. Prasad and Susmi Routray and Reema Khurana and Sartaj Sahni}, title = {Security Enhancement in Data Encryption Standard}, booktitle = {Information Systems, Technology and Management - Third International Conference, {ICISTM} 2009, Ghaziabad, India, March 12-13, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {31}, pages = {325--334}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00405-6\_34}, doi = {10.1007/978-3-642-00405-6\_34}, timestamp = {Fri, 02 Nov 2018 09:44:37 +0100}, biburl = {https://dblp.org/rec/conf/icistm/VermaP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-0216, author = {A. W. Naji and Shihab A. Hameed and B. B. Zaidan and Wajdi F. Al{-}Khateeb and Othman O. Khalifa and A. A. Zaidan and Teddy Surya Gunawan}, title = {Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques}, journal = {CoRR}, volume = {abs/0908.0216}, year = {2009}, url = {http://arxiv.org/abs/0908.0216}, eprinttype = {arXiv}, eprint = {0908.0216}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-0216.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/PoonamA08, author = {Poonam Garg and Atul Garg}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Memetic {\&} Genetic Algorithms: {A} Comparison between two approaches for the cryptanalysis of Simplified Data Encryption Standard algorithm}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {443--448}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Fri, 13 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/PoonamA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mm/X08bj, editor = {Borko Furht}, title = {Data Encryption Standard {(DES)} and Advanced Encryption Standard {(AES)}}, booktitle = {Encyclopedia of Multimedia, 2nd Ed}, pages = {135--136}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-78414-4\_287}, doi = {10.1007/978-0-387-78414-4\_287}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/mm/X08bj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Phan07a, author = {Raphael C.{-}W. Phan}, title = {Reducing the exhaustive key search of the Data Encryption Standard {(DES)}}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {528--530}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.010}, doi = {10.1016/J.CSI.2006.11.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Phan07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/Kanavathy07, author = {Therverson Kanavathy}, editor = {Hamid R. Arabnia and Victor A. Clincy and Laurence Tianruo Yang}, title = {Security Flaws in {WEP} Data Encryption Standard}, booktitle = {Proceedings of the 2007 International Conference on Wireless Networks, June 25-28, 2007, Las Vegas, Nevada, {USA}}, pages = {199--208}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Mon, 09 Feb 2009 10:38:02 +0100}, biburl = {https://dblp.org/rec/conf/icwn/Kanavathy07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CourtoisB07, author = {Nicolas T. Courtois and Gregory V. Bard}, editor = {Steven D. Galbraith}, title = {Algebraic Cryptanalysis of the Data Encryption Standard}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {152--169}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_10}, doi = {10.1007/978-3-540-77272-9\_10}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/CourtoisB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mm/X06ag, editor = {Borko Furht}, title = {Data Encryption Standard {(DES)} and Advanced Encryption Standard {(AES)}}, booktitle = {Encyclopedia of Multimedia}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-30038-4\_46}, doi = {10.1007/0-387-30038-4\_46}, timestamp = {Wed, 26 Jun 2019 12:55:10 +0200}, biburl = {https://dblp.org/rec/reference/mm/X06ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisB06, author = {Nicolas T. Courtois and Gregory V. Bard}, title = {Algebraic Cryptanalysis of the Data Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2006}, url = {http://eprint.iacr.org/2006/402}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4772, author = {Scott G. Kelly}, title = {Security Implications of Using the Data Encryption Standard {(DES)}}, journal = {{RFC}}, volume = {4772}, pages = {1--28}, year = {2006}, url = {https://doi.org/10.17487/RFC4772}, doi = {10.17487/RFC4772}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/05/BeletskyyB05, author = {Volodymyr Beletskyy and D. Burak}, editor = {Jerzy Pejas and Andrzej Piegat}, title = {Parallelization of the Data Encryption Standard {(DES)} algorithm}, booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems}, pages = {23--33}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23484-5\_3}, doi = {10.1007/0-387-23484-5\_3}, timestamp = {Thu, 24 Jan 2019 18:24:48 +0100}, biburl = {https://dblp.org/rec/books/sp/05/BeletskyyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BiryukovC05, author = {Alex Biryukov and Christophe De Canni{\`{e}}re}, editor = {Henk C. A. van Tilborg}, title = {Data encryption standard {(DES)}}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_94}, doi = {10.1007/0-387-23483-7\_94}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BiryukovC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/polibits/GarciaEV04, author = {V{\'{\i}}ctor Manuel Silva Garc{\'{\i}}a and Eduardo Rodr{\'{\i}}guez Escobar and Eduardo Vega{-}Alvarado}, title = {Criptograf{\'{\i}}a: Data Encryption Standard}, journal = {Polibits}, volume = {30}, pages = {3--5}, year = {2004}, url = {https://doi.org/10.17562/PB-30-1}, doi = {10.17562/PB-30-1}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/polibits/GarciaEV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/YangWK04, author = {Bo Yang and Kaijie Wu and Ramesh Karri}, title = {Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard}, booktitle = {Proceedings 2004 International Test Conference {(ITC} 2004), October 26-28, 2004, Charlotte, NC, {USA}}, pages = {339--344}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/TEST.2004.1386969}, doi = {10.1109/TEST.2004.1386969}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itc/YangWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWK04, author = {Bo Yang and Kaijie Wu and Ramesh Karri}, title = {Scan Based Side Channel Attack on Data Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2004}, url = {http://eprint.iacr.org/2004/083}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YangWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pppj/LoughranD03, author = {John Loughran and Tom Dowling}, editor = {James F. Power and John Waldron}, title = {A Java implemented key collision attack on the data encryption standard {(DES)}}, booktitle = {Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, {PPPJ} 2003, Kilkenny City, Ireland, June 16-18, 2003}, series = {{ACM} International Conference Proceeding Series}, volume = {42}, pages = {155--157}, publisher = {{ACM}}, year = {2003}, url = {https://dl.acm.org/citation.cfm?id=957335}, timestamp = {Mon, 26 Nov 2018 15:05:58 +0100}, biburl = {https://dblp.org/rec/conf/pppj/LoughranD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3537, author = {Jim Schaad and Russell Housley}, title = {Wrapping a Hashed Message Authentication Code {(HMAC)} key with a Triple-Data Encryption Standard {(DES)} Key or an Advanced Encryption Standard {(AES)} Key}, journal = {{RFC}}, volume = {3537}, pages = {1--9}, year = {2003}, url = {https://doi.org/10.17487/RFC3537}, doi = {10.17487/RFC3537}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3537.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox00g, author = {Dirk Fox}, title = {Data Encryption Standard {(DES)}}, journal = {Datenschutz und Datensicherheit}, volume = {24}, number = {12}, year = {2000}, timestamp = {Fri, 12 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox00g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KapsP99, author = {Jens{-}Peter Kaps and Christof Paar}, title = {{DES} auf FPGAs - Hochgeschwindigkeits-Architekturen f{\"{u}}r den Data Encryption Standard auf rekonfigurierbarer Hardware}, journal = {Datenschutz und Datensicherheit}, volume = {23}, number = {9}, year = {1999}, timestamp = {Thu, 18 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KapsP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/AdlemanRRW99, author = {Leonard M. Adleman and Paul W. K. Rothemund and Sam T. Roweis and Erik Winfree}, title = {On Applying Molecular Computation to the Data Encryption Standard}, journal = {J. Comput. Biol.}, volume = {6}, number = {1}, pages = {53--63}, year = {1999}, url = {https://doi.org/10.1089/cmb.1999.6.53}, doi = {10.1089/CMB.1999.6.53}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcb/AdlemanRRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HeviaK99, author = {Alejandro Hevia and Marcos A. Kiwi}, title = {Strength of two data encryption standard implementations under timing attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {4}, pages = {416--437}, year = {1999}, url = {https://doi.org/10.1145/330382.330390}, doi = {10.1145/330382.330390}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HeviaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/HeviaK98, author = {Alejandro Hevia and Marcos A. Kiwi}, editor = {Claudio L. Lucchesi and Arnaldo V. Moura}, title = {Strength of Two Data Encryption Standard Implementations under Timing Attacks}, booktitle = {{LATIN} '98: Theoretical Informatics, Third Latin American Symposium, Campinas, Brazil, April, 20-24, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1380}, pages = {192--205}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054321}, doi = {10.1007/BFB0054321}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/latin/HeviaK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CoppersmithHMZ97, author = {Don Coppersmith and Chris L. Holloway and Stephen M. Matyas and Nevenko Zunic}, title = {The data encryption standard}, journal = {Inf. Secur. Tech. Rep.}, volume = {2}, number = {2}, pages = {22--24}, year = {1997}, url = {https://doi.org/10.1016/S1363-4127(97)81325-8}, doi = {10.1016/S1363-4127(97)81325-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CoppersmithHMZ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schaefer96, author = {Edward F. Schaefer}, title = {A Simplified Data Encryption Standard Algorithm}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {77--84}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884799}, doi = {10.1080/0161-119691884799}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schaefer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/AdlemanRRW96, author = {Leonard M. Adleman and Paul W. K. Rothemund and Sam T. Roweis and Erik Winfree}, editor = {Laura F. Landweber and Eric B. Baum}, title = {On applying molecular computation to the data encryption standard}, booktitle = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, June 10-12, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {44}, pages = {31--44}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/044/02}, doi = {10.1090/DIMACS/044/02}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/AdlemanRRW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Shepherd95, author = {Simon J. Shepherd}, title = {A high speed software implementation of the Data Encryption Standard}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {349--357}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00007-U}, doi = {10.1016/0167-4048(95)00007-U}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Shepherd95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/Coppersmith94, author = {Don Coppersmith}, title = {The Data Encryption Standard {(DES)} and its strength against attacks}, journal = {{IBM} J. Res. Dev.}, volume = {38}, number = {3}, pages = {243--250}, year = {1994}, url = {https://doi.org/10.1147/rd.383.0243}, doi = {10.1147/RD.383.0243}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/Coppersmith94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CarterCN94, author = {Gary Carter and Andrew J. Clark and Lauren Nielsen}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {{DESV-1:} {A} Variation of the Data Encryption Standard {(DES)}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {427--430}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000455}, doi = {10.1007/BFB0000455}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CarterCN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Matsui94, author = {Mitsuru Matsui}, editor = {Yvo Desmedt}, title = {The First Experimental Cryptanalysis of the Data Encryption Standard}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {1--11}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_1}, doi = {10.1007/3-540-48658-5\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Matsui94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0032320, author = {Eli Biham and Adi Shamir}, title = {Differential Cryptanalysis of the Data Encryption Standard}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4613-9314-6}, doi = {10.1007/978-1-4613-9314-6}, isbn = {978-1-4613-9316-0}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0032320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Menkus92e, author = {Belden Menkus}, title = {Re-examining the Data Encryption Standard}, journal = {Comput. Secur.}, volume = {11}, number = {8}, pages = {703--706}, year = {1992}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Menkus92e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GaronO91, author = {Gilles Garon and Richard Outerbridge}, title = {Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's}, journal = {Cryptologia}, volume = {15}, number = {3}, pages = {177--193}, year = {1991}, url = {https://doi.org/10.1080/0161-119191865849}, doi = {10.1080/0161-119191865849}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GaronO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Bishop88, author = {Matt Bishop}, title = {An Application of a Fast Data Encryption Standard Implementation}, journal = {Comput. Syst.}, volume = {1}, number = {3}, pages = {221--254}, year = {1988}, url = {http://www.usenix.org/publications/compsystems/1988/sum\_bishop.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Bishop88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KaliskiRS88, author = {Burton S. Kaliski Jr. and Ronald L. Rivest and Alan T. Sherman}, title = {Is the Data Encryption Standard a Group? (Results of Cycling Experiments on {DES)}}, journal = {J. Cryptol.}, volume = {1}, number = {1}, pages = {3--36}, year = {1988}, url = {https://doi.org/10.1007/BF00206323}, doi = {10.1007/BF00206323}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KaliskiRS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/SmidB88, author = {Miles E. Smid and Dennis K. Branstad}, title = {Data Encryption Standard: past and future}, journal = {Proc. {IEEE}}, volume = {76}, number = {5}, pages = {550--559}, year = {1988}, url = {https://doi.org/10.1109/5.4441}, doi = {10.1109/5.4441}, timestamp = {Fri, 09 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/SmidB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland87k, author = {Harold Joseph Highland}, title = {Data encryption standard II?}, journal = {Comput. Secur.}, volume = {6}, number = {3}, pages = {195--196}, year = {1987}, url = {https://doi.org/10.1016/0167-4048(87)90095-2}, doi = {10.1016/0167-4048(87)90095-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland87k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KaliskiRS85, author = {Burton S. Kaliski Jr. and Ronald L. Rivest and Alan T. Sherman}, editor = {Franz Pichler}, title = {Is the Data Encryption Standard a Group? (Preliminary Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {219}, pages = {81--95}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39805-8\_10}, doi = {10.1007/3-540-39805-8\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KaliskiRS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Krause84, author = {Lothar Krause}, title = {Data encryption in ISO, the International Organization for Standardization}, journal = {Comput. Secur.}, volume = {3}, number = {3}, pages = {234--236}, year = {1984}, url = {https://doi.org/10.1016/0167-4048(84)90045-2}, doi = {10.1016/0167-4048(84)90045-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Krause84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Schaumuller-Bichl82, author = {Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Zur Analyse des Data encryption standard und Synthese verwandter Chiffriersysteme}, school = {Johannes Kepler University Linz, Austria}, year = {1982}, url = {https://d-nb.info/820984949}, isbn = {978-3-85369-521-0}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Schaumuller-Bichl82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Davies82, author = {Donald W. Davies}, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {Some Regular Properties of the 'Data Encryption Standard' Algorithm}, booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, pages = {89--96}, publisher = {Plenum Press, New York}, year = {1982}, url = {https://doi.org/10.1007/978-1-4757-0602-4\_8}, doi = {10.1007/978-1-4757-0602-4\_8}, timestamp = {Thu, 25 Jul 2019 12:26:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Davies82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schaumuller-Bich82, author = {Ingrid Schaum{\"{u}}ller{-}Bichl}, editor = {Thomas Beth}, title = {Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding}, booktitle = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982}, series = {Lecture Notes in Computer Science}, volume = {149}, pages = {235--255}, publisher = {Springer}, year = {1982}, url = {https://doi.org/10.1007/3-540-39466-4\_17}, doi = {10.1007/3-540-39466-4\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schaumuller-Bich82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/Smid81, author = {Miles E. Smid}, title = {Integrating the Data Encryption Standard into Computer Networks}, journal = {{IEEE} Trans. Commun.}, volume = {29}, number = {6}, pages = {762--772}, year = {1981}, url = {https://doi.org/10.1109/TCOM.1981.1095071}, doi = {10.1109/TCOM.1981.1095071}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/Smid81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmsj/EhrsamMMT78, author = {William R. Ehrsam and Stephen M. Matyas and Carl H. Meyer and Walter L. Tuchman}, title = {A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard}, journal = {{IBM} Syst. J.}, volume = {17}, number = {2}, pages = {106--125}, year = {1978}, url = {https://doi.org/10.1147/sj.172.0106}, doi = {10.1147/SJ.172.0106}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmsj/EhrsamMMT78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/afips/Meyer78, author = {Carl H. Meyer}, editor = {Sakti P. Ghosh and Leonard Y. Liu}, title = {Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard}, booktitle = {American Federation of Information Processing Societies: 1978 National Computer Conference, June 5-8, 1978, Anaheim, CA, {USA}}, series = {{AFIPS} Conference Proceedings}, volume = {47}, pages = {1119--1126}, publisher = {{AFIPS} Press}, year = {1978}, timestamp = {Fri, 17 Jul 2020 16:12:47 +0200}, biburl = {https://dblp.org/rec/conf/afips/Meyer78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DiffieH77, author = {Whitfield Diffie and Martin E. Hellman}, title = {Special Feature Exhaustive Cryptanalysis of the {NBS} Data Encryption Standard}, journal = {Computer}, volume = {10}, number = {6}, pages = {74--84}, year = {1977}, url = {https://doi.org/10.1109/C-M.1977.217750}, doi = {10.1109/C-M.1977.217750}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DiffieH77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MorrisSW77, author = {Robert H. Morris Sr. and Neil J. A. Sloane and Aaron D. Wyner}, title = {Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {281--291}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833020}, doi = {10.1080/0161-117791833020}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MorrisSW77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.