Cryptanalysis

Results: 756



#Item
101

Tuple cryptanalysis of ARX with application to BLAKE and Skein Jean-Philippe Aumasson1 , Ga¨etan Leurent2 , Willi Meier3,∗ , Florian Mendel4 , Nicky Mouha5,6,† , Raphael C.-W. Phan7 , Yu Sasaki8 , and Petr Susil9 1

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:43
    102Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

    Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

    Add to Reading List

    Source URL: iacr.org

    Language: English - Date: 2010-11-05 17:58:40
    103

    Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov and Lintao Zhang Microsoft Research, Silicon Valley Campus {mironov,lintaoz}@microsoft.com

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2006-07-23 22:24:46
      104

      Parallel Cryptanalysis Ruben Niederhagen Parallel Cryptanalysis

      Add to Reading List

      Source URL: polycephaly.org

      Language: English - Date: 2012-06-13 05:18:56
        105

        Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder and Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T.Road, Kolkata, India. {subhabrata r,pa

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-21 04:21:44
          106

          Uitnodiging Parallel Cryptanalysis Tot het bijwonen van de openbare verdediging van mijn proefschrift

          Add to Reading List

          Source URL: polycephaly.org

          - Date: 2012-06-13 05:18:57
            107

            Cryptanalysis of Symmetric-Key Primitives: Automated Techniques

            Add to Reading List

            Source URL: www.cosic.esat.kuleuven.be

            Language: English - Date: 2012-05-31 02:20:38
              108

              Published in Electronics Letters , Vol. 34, No. 18, pp. 1738–1739, SeptemberImproved authenticated multiple-key agreement protocol Cryptanalysis of Harn-Lin scheme: One straightforward modification of the abov

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:44:16
                109Cryptography / Mathematics / Applied mathematics / Post-quantum cryptography / Finite fields / Linear code / Coding theory / Cryptanalysis / Hadamard matrix / Cipher

                Scientific Report First name / Family name Dr. Dimitrios Simos

                Add to Reading List

                Source URL: fellowship.ercim.eu

                Language: English - Date: 2013-02-27 04:48:46
                110Alan Turing / Cryptography / Turing machine / Computability theory / Models of computation / Codebreaker / Public-key cryptography / Known-plaintext attack / Cipher / Turing / Encryption / Cryptanalysis

                ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

                Add to Reading List

                Source URL: www.cs4fn.org

                Language: English - Date: 2012-11-21 11:20:28
                UPDATE