next up previous contents
Successivo: About this document Su: Computer Virus Precedente: Appendice

Riferimenti

1
ANSI X3.92, American National Standard for Data Encryption Algorithm (DEA), American National Standards Institute, 1981.

2
S. K. Baneryce, High Speed Implementation of DES, Computer and Security, v.1, 1982, pp. 261-267.

3
E. Biham e A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, J. Cryptology, v.4, 1991, pp. 3-72.

4
E. Biham e A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1983.

5
E. F. Brickell, J. H. Moore e M. R. Purtill, Structure in the S-BOXES of DES, Lecture Notes in Computer Science, Advances in Cryptology - Proceedings of CRYPTO '86, Springer-Verlag, 1987, v. 263, pp. 3-8.

6
P. Christoffersson et al., Crypto Users' Handbook, IFIP 1988, Elsevier Science Publishers.

7
D. W. Davies, Some Regular Properties of the DES, Advances in Cryptology - Proceedings of CRYPTO '82, Plenum Press 1983, pp. 89-96.

8
M. Davio e Y. Desmedt, Analitical Characteristics of the Data Encryption Standard, Advances in Cryptology - Proceedings of CRYPTO '83, Plenum Press, 1984, pp. 171-202.

9
M. Davio e Y. Desmedt, Dependance of Output on Input in DES: Small Avalanche Characteristics, Advances in Cryptology - Proceedings of CRYPTO '84, Berlin: Springer - Verlag, 1985, pp. 359-376.

10
Department of the Treasury, Electronic Funds and Securities Transfer Policy-Message Authentication and Enhanced Security, No. 106-09, Department of the Treasury, Oct 2, 1986.

11
W. Diffie, Cryptography Techology: Fifteen Years Forecast, BNR Inc., Jan 1981.

12
W. Diffie e M. Hellman, Exhaustive Cryptanalysis of the NBS Data Encryption Standard, Computer, v. 10, No. 6, Jun 1977, pp. 74-84.

13
H. Eberle, A High Speed DES Implementation for Network Applications, Advances in Cryptology - Proceedings of CRYPTO '92 , Berlin: Springer - Verlag, 1993, pp. 527-545.

14
R. C. Fairfield, A. Matusevich e J. Plany, An LSI Digital Encryption Processor (DEP), Advances in Cryptology - Proceedings of CRYPTO '84, Berlin: Springer - Verlag, 1985, pp. 115-143.

15
J. Goubertand e Y. Desmedt, Efficient Hardware Implementation of the DES, Advances in Cryptology - Proceedings of CRYPTO '84, Berlin: Springer - Verlag, 1985, pp. 147-173.

16
GSA Federal Standards 1026, Telecommunications: General Security Requirements for Equipment Using the Data Encryption Standard, General Services Administration, Apr 1982.

17
M. E. Hellman, R. C. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig e P. Schweitzer, Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard, Technical Report SEL 76-042, Information System Lab, Department of Electrical Engineering, Stanford University, 1976.

18
G. B. Kolata, Flaws Found in Popular Code, Science, 219, January 28, 1983, pp. 369-370.

19
A. G. Konheim, Cryptography: a Primer, New York, J. Wiley & Sons, 1981.

20
R. Morris, N. J . Soane e A. D. Wyner, Assessment of NBS Proposed Data Encryption Standard, Cryptologia, v.1, No.3, Jul 1977, pp. 281-291.

21
NBS FIPS PUB 46, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan 1977.

22
NBS FIPS PUB 46, Des Modes of operation, National Bureau of Standards, 1977.

23
Proposed Reaffirmation of Federal Information Processing Standards (FIPS) 46-1, Data Encryption Standard DES, Federal Register, v.57, N.177, 11 Sep, 1992.

24
B. Schneier, Applied Criptography: Protocols, Algorithms and Source Code in C, John Wiley & Sons, Inc., 1994.

25
M. E. Smid e D. K. Branstad, The Data Encryption Standard: past and future, Contemporary Cryptology, The Science of Information Integrity, pp. 43-64, IEEE Press, 1992.

26
J. L. Smith, The Design of Lucifer, A Cryptographic Device for Data Communications, IBM Research Report RC3326, 1971.

27
D. R. Stinson, Criptography Theory and Practice, 1995, by CRC Press, Inc..

28
M. J. Wiener, Efficient DES key search, unpublished manuscript presented at CRYPTO '93 Rump Session.


Aniello Castiglione e Gerardo Maiorano < anicas,germai@zoo.diaedu.unisa.it >