Cryptanalysis

Results: 756



#Item
341Internet protocols / Challenge-response authentication / Authentication / Password authentication protocol / Password / Security / Cryptography / Computer security

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
342Differential cryptanalysis / ICE / Boomerang attack / International Data Encryption Algorithm / Differential-linear attack / Data Encryption Standard / Cryptography / Block ciphers / Linear cryptanalysis

Improved Linear Trails for the Block Cipher Simon Tomer Ashur ESAT/COSIC KU Leuven and iMinds Leuven, Belgium tomer.ashur @ esat.kuleuven.be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 14:24:24
343Cryptographic hash functions / Permutations / NIST hash function competition / Grøstl / Combinatorics / Advanced Encryption Standard / Block cipher / SHA-1 / SHA-2 / Cryptography / Mathematics / Error detection and correction

Improved Cryptanalysis of AES-like Permutations Jérémy Jean1 , María Naya-Plasencia2 , and Thomas Peyrin3 École Normale Supérieure, France INRIA Paris-Rocquencourt, France Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:21:47
344Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
345Functional languages / Q

Cryptanalysis of GGH Map⋆ Yupu Hu and Huiwen Jia ISN Laboratory, Xidian University, [removed]Xi’an, China [removed] [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 22:13:03
346Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
347Electronic commerce / Elliptic curve cryptography / RSA / OpenSSL / Cryptanalysis / Key size / Cryptographic engineering / Microsoft CryptoAPI / Cryptography / Cryptographic software / Public-key cryptography

Crypto for developers[removed]Jean-Philippe Aumasson (@veorq) The training This training is about cryptography for non-cryptographers: how to make sure you

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2013-08-17 18:32:50
348FIPS 140-2 / Smart card / Cryptanalysis / NTRU / Key / Secure cryptoprocessor / Paul Kocher / Cryptography / Power analysis / Tamper resistance

Microsoft PowerPoint[removed]20_cryptofirewall_cptwg.ppt

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2007-06-20 19:28:14
349Feistel cipher / Cipher / Linear cryptanalysis / Cryptanalysis / Block ciphers / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Q

On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
350Data Encryption Standard / One-time pad / Stream cipher / Substitution cipher / Cryptography / Cryptanalysis / Cipher

Internet Watch Cryptography: Is Staying with the Herd Really Best?

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2007-08-30 22:44:30
UPDATE