Cryptanalysis

Results: 756



#Item
241Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
242Initialization vector / Weak key / Ciphertext / Encryption / Cryptography / Cryptanalysis / RC4

Introduction Office Encryption Principle of Cryptanalysis

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2009-10-28 10:48:05
243Polynomials / Integer factorization algorithms / Public-key cryptography / Finite fields / XTR / Polynomial interpolation / Discrete Fourier transform / Polynomial / RSA / Mathematics / Abstract algebra / Mathematical analysis

Cryptanalysis of the RSA Subgroup Assumption from TCC 2005? Jean-S´ebastien Coron1 , Antoine Joux2,3 , Avradip Mandal1 , David Naccache4 , and Mehdi Tibouchi1,4 1 Universit´e du Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 02:57:04
244Cryptology / Bletchley Park / Enigma machine / Cryptography / Espionage / Cryptanalysis

A Viral Enigma Will You Survive? Students will learn the history of cryptography and code breaking from its early beginnings to its use in message

Add to Reading List

Source URL: www.quantumvictoria.vic.edu.au

Language: English - Date: 2014-08-14 01:08:32
245Voynich manuscript / Wilfrid Michael Voynich / John Tiltman / William F. Friedman / Manuscript / Elizebeth Friedman / Cryptanalysis / James Gillogly / Photostat machine / Cryptography / Riverbank Laboratories / Shakespeare authorship question

William F. Friedman’s Transcription of the Voynich Manuscript Jim Reeds AT&T Bell Laboratories Murray Hill, New Jersey 07974

Add to Reading List

Source URL: voynich.net

Language: English - Date: 2015-04-29 14:37:33
246Linear cryptanalysis / Key schedule / Advanced Encryption Standard / Block ciphers / MacGuffin / Differential-linear attack / Cryptography / Differential cryptanalysis / ICE

Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 22:05:20
247Differential cryptanalysis / Linear cryptanalysis / Block cipher

Microsoft Word - SEED_Self_Evaluation-English_M

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
248Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
249Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
250Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
UPDATE