Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

For centuries, cryptography has been a valuable asset of the military and diplomatic communities. Indeed, it is so valuable that its practice has usually been shrouded in secrecy and mystery.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Martin E. Hellman,et al.  A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.

[3]  L. Brillouin,et al.  Science and information theory , 1956 .

[4]  R.W. Keyes,et al.  Physical limits in digital electronics , 1975, Proceedings of the IEEE.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Martin E. Hellman,et al.  An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.

[7]  G. Leopold The Federal Register. , 1979, Journal of clinical ultrasound : JCU.

[8]  N. J. A. Sloane,et al.  Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.