• Publications
  • Influence
Pairs and triplets of DES S-boxes
This paper describes an investigation of a potential weakness in DES which leads to a statistical property observable in plaintext/ciphertext pairs and dependent on the key. However, the number of
Applying the RSA Digital Signature to Electronic Mail
  • D. Davies
  • Computer Science
    Computer
  • 1 February 1983
TLDR
Authentication by the customary methods using symmetric ciphers can do nothing to resolve disputes arising from the dishonesty of either sender or receiver and was proposed as a solution to the dispute problem.
Longest "Separated" Paths and Loops in an N Cube
  • D. Davies
  • Computer Science
    IEEE Trans. Electron. Comput.
  • 1 April 1965
A digital communication network for computers giving rapid response at remote terminals
TLDR
Those computer applications which involve rapid response to events at distant points create special problems in digital communication, and could increase more rapidly if better solutions existed to the communication problems.
Some Regular Properties of the 'Data Encryption Standard' Algorithm
TLDR
This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere and are included for completeness.
Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.)
  • D. Davies, W. Price
  • Computer Science
    Wiley series in communication and distributed…
  • 1 May 1989
Data security ciphers and their properties the data encryption standard using block cipher in practice authentication and integrity key management identity verification public key ciphers digital
Communication Networks for Computers
TLDR
One of the books that can be recommended for new readers is communication networks for computers, which is not kind of difficult book to read.
A Message Authenticator Algorithm Suitable for A Mainframe Computer
  • D. Davies
  • Computer Science
    CRYPTO
  • 23 August 1985
TLDR
Authenticators are widely used to protect payment messages from active attack and the earlier name for them in banking was ‘test-key’, but this obsolescent term is confusing to cryptographers.
The average Cycle size of the Key-Stream in Output Feedback Encipherment
TLDR
Output feedback is a method of using the ‘Data Encryption Standard’ (DES) without error extension, since both encipherment and decipherment consist of adding a ‘key-stream’ modulo 2 to the data stream.
...
1
2
3
4
5
...