Cryptanalysis

Results: 756



#Item
221PP / Cryptanalysis / Quantum information science / PH / Theoretical computer science / Applied mathematics / Quantum complexity theory

Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case Marta Conde Pena1 Jean-Charles Faug`ere2,3,4

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 10:53:08
222Advanced Encryption Standard / Cipher / GOST / Feistel cipher / Linear cryptanalysis / ICE / Weak key / Symmetric-key algorithm / Serpent / Cryptography / Block ciphers / Key schedule

LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
223SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
224Microsoft Windows / System software / Password / Encryption / Private Disk / Encrypting File System / Cryptographic software / Disk encryption / Software

Passware Encryption Analyzer .NET SDK 2015 Add advanced encryption detection tool to your applications Passware Inc., a technological leader in password recovery, applies its 16-year experience in cryptanalysis to introd

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2014-12-03 21:12:27
225ICE / Feistel cipher / Differential cryptanalysis / Key schedule / Differential of a function / Differential equation / Differential / Block cipher / Cryptography / MISTY1 / KASUMI

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
226Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

PDF Document

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
227GSM / Cipher / Cryptanalysis / A5/2 / KASUMI / Index of cryptography articles / Cryptography / Stream ciphers / A5/1

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:27
228Shakespeare authorship question / William F. Friedman / Cryptanalysis / Lambros D. Callimahos / David Kahn / National Security Agency / The Codebreakers / SIGABA / Aegean Park Press / Cryptography / Espionage / Riverbank Laboratories

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2015-04-20 07:42:08
229Cryptography / Keystroke logging / Ciphertext / Chosen-plaintext attack / Espionage / Cryptanalysis / Cryptology

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:31
UPDATE