Cryptanalysis

Results: 756



#Item
371Code / Cyberwarfare / Canberra / Enigma machine / Cryptanalysis / Cryptography / Espionage / Questacon

King Edward Terrace Canberra ACT PO Box 5322 Kingston ACT 2604 t +[removed]f +[removed]www.questacon.edu.au Media Release

Add to Reading List

Source URL: www.questacon.edu.au

Language: English - Date: 2013-06-19 23:28:47
372Espionage / Metadata / Signals intelligence / Intelligence / Military intelligence / Cryptography / Cryptanalysis / Bearing / National Security Agency / National security / Linguistics / Navigation

WlDum:DWlD(1 LrffiIDU ~l3[BlD(BVU~ (D(Bl3W[B~ ~f]ffiID~f] ~~

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 13:27:52
373Keystream / Rotor machine / Cipher / Cryptanalysis / One-time pad / Block cipher / Enigma machine / Linear cryptanalysis / Differential cryptanalysis / Cryptography / Stream ciphers / Substitution cipher

Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 13:01:48
374Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-10 16:40:02
375Linear cryptanalysis / Piling-up lemma / Linear feedback shift register / Vector space / Algebra / Mathematics / Group theory

Improved Linear Distinguishers for SNOW 2.0 Kaisa Nyberg1,2 and Johan Wall´en1 1 Helsinki University of Technology and 2 Nokia Research Center, Finland Email: [removed]; [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
376Cryptanalysis / Cryptology

HPC in Cryptanalysis A short tutorial Antoine Joux Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
377Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
378Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
379Pseudorandom number generators / Cryptography / Binary arithmetic / Linear feedback shift register / Knapsack problem / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Knapsack Generator

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-02-14 15:21:20
380Numerical linear algebra / Polynomials / Gaussian elimination / Matrix / System of polynomial equations / Cryptanalysis / GF / Determinant / Algebra / Mathematics / Linear algebra

ABSTRACT Title of dissertation: ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2007-05-15 19:26:43
UPDATE