Attacking Triple Encryption
- 16 October 1998
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 239-253
- https://doi.org/10.1007/3-540-69710-1_16
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- How to Protect DES Against Exhaustive Key SearchLecture Notes in Computer Science, 1996
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESLecture Notes in Computer Science, 1996
- Improving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudeLecture Notes in Computer Science, 1996
- A Known-Plaintext Attack on Two-Key Triple EncryptionLecture Notes in Computer Science, 1991
- On the security of multiple encryptionCommunications of the ACM, 1981