How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps

Eli Biham. How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps. Inf. Process. Lett., 84(3):117-124, 2002. [doi]

@article{Biham02,
  title = {How to decrypt or even substitute DES-encrypted messages in 2:::28::: steps},
  author = {Eli Biham},
  year = {2002},
  doi = {10.1016/S0020-0190(02)00269-7},
  url = {http://dx.doi.org/10.1016/S0020-0190(02)00269-7},
  researchr = {https://researchr.org/publication/Biham02},
  cites = {0},
  citedby = {0},
  journal = {Inf. Process. Lett.},
  volume = {84},
  number = {3},
  pages = {117-124},
}