Cryptanalysis

Results: 756



#Item
381Electronic engineering / Key selection vector / High-bandwidth Digital Content Protection / Television technology / Video signal / Digital Visual Interface / Public-key cryptography / HDCP Repeater bit / Cryptography / Computer hardware / High-definition television

A Cryptanalysis of the High-bandwidth Digital Content Protection System Scott Crosby1 , Ian Goldberg2 , Robert Johnson3 , Dawn Song3 , and David Wagner3 1 Carnegie-Mellon University

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2006-12-21 16:06:36
382Cipher / Block cipher / Stream cipher / Cryptanalysis / RSA / Key / Digital signature / Index of cryptography articles / Book:Cryptography / Cryptography / Public-key cryptography / Key management

The Laws of Cryptography with Java Code by Neal R. Wagner Copyright c 2003 by Neal R. Wagner. All rights reserved.

Add to Reading List

Source URL: www.cs.utsa.edu

Language: English - Date: 2004-08-20 15:40:56
383Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
384Public key infrastructure / Digital signature / Password / Key / Man-in-the-middle attack / Cryptanalysis / NTRU / Index of cryptography articles / Web of trust / Cryptography / Key management / Public-key cryptography

The Future of Cryptography Practice and Theory Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
385Caesar cipher / Vigenère cipher / Transposition cipher / Cryptanalysis / Enigma machine / Book cipher / Classical cipher / Polyalphabetic cipher / Cryptography / Substitution cipher / Cipher

Codes and ciphers Julius Caesar, the Enigma and the internet R. F. Churchhouse published by the press syndicate of the university of cambridge

Add to Reading List

Source URL: www.portknocking.org

Language: English - Date: 2003-11-18 02:04:53
386Civil law / Digital signature / RSA / Security / Group signature / Cryptography / Public-key cryptography / Cyberwarfare

Microsoft Word[removed]Cryptanalysis of a threshold proxy signature with known signers.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-17 01:16:10
387Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
388Symmetric-key algorithm / Cryptanalysis / Cipher / Novotel / Stream cipher / Cryptography / Block cipher / Serge Vaudenay

FSE 2013 Program Welcome reception will be at poolside of Novotel, and all technical sessions will be at Cinnamon Room of Novotel. The program is available in PDF. Sunday, 10 March 2013 •

Add to Reading List

Source URL: fse2013.spms.ntu.edu.sg

Language: English - Date: 2013-03-09 04:59:44
389Weak key / Linear cryptanalysis / Cipher / Correlation and dependence / Q / Differential cryptanalysis / Cryptography / Key schedule / Block cipher

On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem1 , Martin ˚ Agren2 , Peter Beelen1 , and Gregor Leander1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-30 09:12:12
390Polynomial / Permutation polynomial / Mathematics / Symmetric-key algorithm / XTR

Journal of Electronic Imaging 15(4), [removed]Oct–Dec[removed]Cryptanalysis of an image encryption scheme Shujun Li* The Hong Kong Polytechnic University Department of Electronic and Information Engineering

Add to Reading List

Source URL: repository.lib.polyu.edu.hk

Language: English - Date: 2014-12-02 23:40:51
UPDATE