Cryptanalysis

Results: 756



#Item
481Communication / Cybernetics / Information Age / Information theory / Statistical hypothesis testing / Cipher / Logic / Statistics / Cryptography / Science

DID: [removed]UNCLASSIFIED A Text Recognition Procedure for Cryptanalysis BY C. V. KIMBALL

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-04-24 05:56:03
482Mass surveillance / National Security Agency / United States government secrecy / IBM 7950 Harvest / Engineering Research Associates / Cryptanalysis / Joint Electronics Type Designation System / Cryptanalytic computer / National Cryptologic Museum / Espionage / United States Department of Defense / Cryptography

DOCID,: [removed]U)Before Super-Computers: NSA And Computer Development

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2010-09-23 10:40:00
483Bletchley Park / Lorenz cipher / Cryptanalysis of the Lorenz cipher / Turingery / Cryptography / Espionage / Buckinghamshire

DOCID: [removed]TOP SECRET

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-04-14 10:04:06
484Cipher / Science / One-time pad / Cryptanalysis / Espionage / Substitution cipher / Vigenère cipher / Cryptography / Stream ciphers / Mathematical sciences

POCID: [removed]pproved for release by NSA on[removed], Transparency Case# 3852 IP er BY H. CAMPAIGNE

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-12-28 11:25:35
485Cryptanalysis / Cryptology

DocrD: [removed]eet4RBEtfR,A1.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-11-05 10:01:32
486Cube attack / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Trivium / Block cipher / Chosen-plaintext attack / Cipher / Cryptography / Espionage / Stream ciphers

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
487NIST hash function competition / Hashing / SHA-1 / SHA-2 / Keccak / Skein / Cryptanalysis / Joan Daemen / Hash list / Error detection and correction / Cryptographic hash functions / Cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
488ID-based encryption / Elliptic curve cryptography / Cryptographic protocol / RSA / PKCS / Random oracle / Digital signature / Cryptanalysis / Encryption / Cryptography / Public-key cryptography / Radio-frequency identification

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 13:20:40
489Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
490Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English
UPDATE