How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps

Eli Biham. How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps. Inf. Process. Lett., 84(3):117-124, 2002. [doi]

Abstract

Abstract is missing.