Eli Biham. How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps. Inf. Process. Lett., 84(3):117-124, 2002. [doi]
@article{Biham02,
title = {How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps},
author = {Eli Biham},
year = {2002},
doi = {10.1016/S0020-0190(02)00269-7},
url = {http://dx.doi.org/10.1016/S0020-0190(02)00269-7},
researchr = {https://researchr.org/publication/Biham02},
cites = {0},
citedby = {0},
journal = {Inf. Process. Lett.},
volume = {84},
number = {3},
pages = {117-124},
}