Results 1 - 10
of
849
Table 3: Hau gkeit der Realisierung der verschiedenen Aussprachevarianten
Table 5: Uniformity of Linear distribution table DES s2DES s3DES s5DES
1995
"... In PAGE 8: ...atrix in DES, s3DES and s5DES is found to have greater value than 0.6. Therefore we can infer that Boolean functions consisting of DES, s3DES and s5DES do not satisfy the SAC. Finally we checked the uniformity of linear distribution table of a S-box as shown in Table5 . We 2The name of s4DES is skipped with intention since it was distributed in an informal way.... ..."
Cited by 1
Table 3: DES instances
2000
Cited by 67
Table 7: DES Support
"... In PAGE 5: ... When the US export laws were in e ect, the export key length was arti cially reduced to 40 bits, making DES even less secure. Table7 shows the DES usage in detail. While the old US export regulations no longer apply, almost 67 percent of the servers surveyed still support these weak keys, and most Cipher Number Percentage DES-40 12930 66.... ..."
Table 1: Nonlinearity of S-boxes DES s2DES s3DES s5DES
1995
"... In PAGE 6: ... In this Section, we compare the quantitative characteristics of S-boxes in DES and siDES in various points of cryptographic view and evaluate the goodness-of- t of them. We checked the nonlinearity of 4 Boolean functions: Z6 2 ! Z2 consisting of an S-box as shown in Table1 . In the output bit column of this table, 4 denotes the most signi cant location of an output vector and 1 denotes the least signi cant location of an output vector.... ..."
Cited by 1
Table 7. DES Measurements
1998
"... In PAGE 21: ....2.2.7 Overview of Measurement for Every C-module This section presents numbers for processing times (in ms) for all algorithms implemented in separate C-modules. Table 5 depicts MD5, Table 6 includes MD4, Table7 shows DES, Table 8 presents IDEA, and Table 9 covers RC5 with 12 rounds and 128 bit keys. A graphical Table 5.... ..."
Cited by 1
Table 7. DES Measurements
1998
"... In PAGE 21: ....2.2.7 Overview of Measurement for Every C-module This section presents numbers for processing times (in ms) for all algorithms implemented in separate C-modules. Table 5 depicts MD5, Table 6 includes MD4, Table7 shows DES, Table 8 presents IDEA, and Table 9 covers RC5 with 12 rounds and 128 bit keys. A graphical Table 5.... ..."
Cited by 1
Table 5: Comparison of nonlinearity of DES and s2DES S-boxes DES s2DES
1991
Cited by 9
Table 3: Pseudocode for DES.
1997
"... In PAGE 4: ... n283n29Receiving RM cells n28lines 22n7b29n29: for a forward RM cell, record its contents and forward it to the downstream node; for a backward RM cell, update the local credit-balance by CU contained in the RM cell, n0cll in the RM cell with local count and CI bit, and then send it to the upstream node. The Destination Node Algorithm n28 Table3 n29. Two 00.... ..."
Cited by 6
Results 1 - 10
of
849