Content deleted Content added
Rescuing 2 sources and tagging 0 as dead. #IABot (v2.0beta15) |
|||
Line 45:
* Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993. {{ISBN|0-387-97930-1}}, {{ISBN|3-540-97930-1}}.
* Biham, E. and A. Shamir. (1990). Differential Cryptanalysis of DES-like Cryptosystems. Advances in Cryptology — CRYPTO '90. Springer-Verlag. 2–21.
* Eli Biham, Adi Shamir,"Differential Cryptanalysis of the Full 16-Round DES," CS 708, Proceedings of CRYPTO '92, Volume 740 of Lecture Notes in Computer Science, December 1991. [https://web.archive.org/web/20050405183302/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1991/CS/CS0708.ps (Postscript)]
==External links==
* [http://www.engr.mun.ca/~howard/Research/Papers/ldc_tutorial.html A tutorial on differential (and linear) cryptanalysis]
* [https://web.archive.org/web/20090129170430/http://research.cyber.ee/~lipmaa/crypto/link/block/dc.php Helger Lipmaa's links on differential cryptanalysis]
* {{webarchive |url=https://web.archive.org/web/20071019130512/http://home.earthlink.net/~mylnir/desdoc.html |date=October 19, 2007 |title=A description of the attack applied to DES }}
|