Cryptanalysis

Results: 756



#Item
401Computing / Central processing unit / CPU cache / Computer architecture / Cache algorithms / AMD Turion / Bus sniffing / Cache / Computer hardware / Computer memory

CACHE MISSING FOR FUN AND PROFIT COLIN PERCIVAL Abstract. We describe the construction of a channel between processes via the state of a shared memory cache, and its use in the cryptanalysis of RSA. Unlike earlier side-c

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2005-12-25 07:31:08
402English people / Alan Turing / Computer / Code / Cipher / Cryptanalysis / British people / Cryptography / Science

Secret Codes Activity      Grades: 6­8  Goal: Learn about the role computers have played to help save the world.   Duration of lesson: 40 minutes to 1 hour. 

Add to Reading List

Source URL: csedweek.org

Language: English - Date: 2014-12-05 17:11:47
403Code / Cipher / Cryptanalysis / Espionage / Cyberwarfare / Mathematical sciences / Japanese cryptology from the 1500s to Meiji / Cryptography / Substitution cipher / Vigenère cipher

© [removed]Wisconsin Science Olympiad Inc. Division C CODE BUSTERS 1. DESCRIPTION: Contestants will decode encrypted messages using cryptanalysis techniques. 2. TEAMS OF UP TO: 3

Add to Reading List

Source URL: soinc.org

Language: English - Date: 2014-05-08 16:29:36
404Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Bruce Schneier / Cryptography / Cipher / SHA-1

Draft revision: ea089c8[removed]:11:44 +0100) Aaron Kaplan Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ul

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
405Encryption / Cipher / Cryptanalysis / Advanced Encryption Standard / Index of cryptography articles / Cryptography / Ciphertext / Symmetric-key algorithm

JOINT SCHEMES FOR PHYSICAL LAYER SECURITY AND ERROR CORRECTION Oluwayomi Bamidele Adamo, B.S., M.S. Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 16:04:57
406National Security Agency / Cryptanalysis / ECRYPT / International Cryptology Conference / The Codebreakers / Books on cryptography / Cryptography / Cipher / William F. Friedman

Microsoft Word - Cyber Missions Annotated Bibliography.docx

Add to Reading List

Source URL: www.nationalmuseum.af.mil

Language: English - Date: 2014-09-22 10:06:57
407Ciphertext / Cryptanalysis / Japanese cryptology from the 1500s to Meiji / Cipher / VEST / Cryptography / Stream ciphers / Substitution cipher

Probabilistic Methods for a Japanese Syllable Cipher Sujith Ravi and Kevin Knight Information Sciences Institute Computer Science Department University of Southern California

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2009-04-13 11:31:05
408Computational linguistics / Natural language processing / Bigram / Cipher / Cryptanalysis / Substitution cipher / N-gram / Advantage / Statistical machine translation / Cryptography / Science / Linguistics

Large Scale Decipherment for Out-of-Domain Machine Translation Qing Dou and Kevin Knight Information Sciences Institute Department of Computer Science University of Southern California {qdou,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2012-06-22 11:23:41
409Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-20 17:35:58
410Natural language processing / Cryptography / Corpus linguistics / Speech recognition / Statistical machine translation / Text corpus / Cryptanalysis / N-gram / Substitution cipher / Computational linguistics / Science / Linguistics

Deciphering Foreign Language Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-20 17:35:50
UPDATE