Breaking Legacy Banking Standards with Special-Purpose Hardware
暂无分享,去创建一个
[1] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[2] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[3] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[4] Marco Platzner,et al. Field Programmable Logic and Application , 2004, Lecture Notes in Computer Science.
[5] Chris J. Mitchell,et al. Key Recovery and Forgery Attacks on the MacDES MAC Algorithm , 2000, CRYPTO.
[6] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[7] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[8] Christof Paar,et al. Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker , 2006, CHES.
[9] Jean-Didier Legat,et al. Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES , 2003, FPL.
[10] Bart Preneel,et al. Key recovery attack on ANSI X9.19 retail MAC , 1996 .
[11] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[12] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[13] William Stallings. Practical cryptography for data internetworks , 1996 .
[14] Matthew J. Weiner,et al. Efficient DES Key Search , 1994 .