Cryptanalysis

Results: 756



#Item
231Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2012-10-14 17:28:33
232Cipher / Cryptanalysis / Symmetric-key algorithm / RC4 / Encryption software / Index of cryptography articles / Differential cryptanalysis / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
233Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
234Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
235Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
236Crypto-1 / Stream cipher / KeeLoq / Block cipher / Radio-frequency identification / Cipher / Cryptanalysis / Strong cryptography / Key / Cryptography / Key management / MIFARE

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
237Ciphertext / Caesar cipher / Known-plaintext attack / Cryptanalysis / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-01-19 20:59:56
238Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.co.jp

Language: English - Date: 2015-04-05 21:00:45
239Cryptanalysis / Ciphertext / Known-plaintext attack / Caesar cipher / Cipher / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

Supporting Online Problem-Solving Communities with the Semantic Web Anupriya Ankolekar University of Karlsruhe Katia Sycara

Add to Reading List

Source URL: www2006.org

Language: English - Date: 2006-09-05 12:42:59
240Cryptanalysis / Ciphertext / Known-plaintext attack / Caesar cipher / Cipher / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 21, 2014 Homework 1: Threat Modeling and Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
UPDATE