Cryptanalysis

Results: 756



#Item
201Cryptography / Cryptanalysis / Export Control Classification Number / Symmetric-key algorithm / Espionage / Mathematical sciences / Science

Category 5 Part 1 – “Telecommunications” 5D001 “Software” ECCN 5D001 is amended by removing and reserving Items paragraph .b, “Software” “specially designed” or modified to support “technology” cont

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-20 20:28:31
202Key size / Integer factorization algorithms / RSA / Key / Cryptanalysis / Index of cryptography articles / Cryptography / Key management / Public-key cryptography

Universal security from bits and mips to pools, lakes – and beyond Arjen K. Lenstra1 with Thorsten Kleinjung1 and Emmanuel Thom´e2 1

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2014-01-09 15:36:00
203Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
204Key / Cryptanalysis / Public-key cryptography / Index of cryptography articles / Cryptography / ROT13 / Cipher

Cryptography Quiz – Unit 1; Chapter 1 What is the difference between a cipher and a code?

Add to Reading List

Source URL: betweenthenumbers.files.wordpress.com

Language: English - Date: 2015-04-04 21:47:48
205Cryptology / Cryptography / ProVerif / Knowledge / Science / Mathematical sciences / Cryptanalysis

Formal Certification of Game-Based Cryptographic Proofs Santiago Zanella B´eguelin IMDEA Software, Madrid, Spain INRIA Sophia Antipolis - M´

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
206Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
207Key management / Diffie–Hellman key exchange / Ciphertext / Cryptographic hash function / Vigenère cipher / RSA / Key / Cryptanalysis / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

174 BLOWN TO BITS Lessons for the Internet Age Let’s pause for a moment to consider some of the lessons of cryptographic

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:42
208Polynomials / Projective geometry / Finite field / Irreducible polynomial / Oval / Projective plane / Field extension / Collineation / Projective space / Abstract algebra / Mathematics / Algebra

Abstracts of invited lectures Extended differential properties of cryptographic functions A NNE C ANTEAUT (INRIA-Rocquencournt, France) Differential cryptanalysis is one of the very first attack proposed against block ci

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-07-01 05:40:45
209Ciphertext / RSA / GOST / Cryptanalysis / Block cipher / Tiny Encryption Algorithm / Differential cryptanalysis / Treyfer / Cryptography / GOST standards / Advanced Encryption Standard

Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, and Amr M. Youssef Abstract Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-17 22:22:42
210Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
UPDATE