Cryptanalysis

Results: 756



#Item
351MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
352RSA / Digital signature / Cryptography / Public-key cryptography / Cryptanalysis

Microsoft Word - ACISP 2013 Program.docx

Add to Reading List

Source URL: www.acisp2013.qut.edu.au

Language: English - Date: 2013-06-14 03:19:20
353MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
354Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
355KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
356Outline of cryptography / Side channel attack / Edward Felten / Cryptanalysis / International Cryptology Conference / Cryptographic engineering / Elliptic curve cryptography / Cryptography / Lattice-based cryptography / Pwnie Awards

Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-02-25 14:14:07
357Computing / Computer security / Password / Encryption / USB flash drive / Computer network security / Windows Vista / Encrypting File System / Cryptographic software / Disk encryption / Microsoft Windows

Passware Encryption Analyzer Professional 2015 v.2 Encryption detection tool by the leader in password recovery Passware, Inc., a technological leader in password recovery, applies its 15-year experience in cryptanalysis

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2015-03-24 10:24:19
358Central Bureau / Military history of Australia during World War II / Queensland / Bletchley Park / Cipher / Anzac Day / Code / Central Intelligence Agency / Cryptanalysis / Buckinghamshire / Cryptography / Espionage

Central Bureau Intelligence Corps - Association Newsletter December 2005 CENTRAL BUREAU INTELLIGENCE CORPS ASSOCIATION

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-03-30 07:38:04
359Enigma machine / Reflector / Cryptanalysis / Clock / Cryptanalysis of the Enigma / Plugboard / Cryptography / Espionage / Rotor machines

ENIGMA CIPHER MACHINE SIMULATOR[removed]About the Enigma Simulator The German Enigma machine is the most famous example of the battle between codemakers and codebreakers. Never before has the fate of so many lives been so

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-01-31 13:50:27
360LOKI / Khufu and Khafre / Lucifer / Ciphertext / Advanced Encryption Standard / REDOC / Padding / Cryptanalysis / Cryptographic hash function / Cryptography / Differential cryptanalysis / Block cipher

Microsoft Word - Klima_SPI_2007_EN

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
UPDATE