Cryptanalysis

Results: 756



#Item
41Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

Add to Reading List

Source URL: www.nku.edu

- Date: 2015-03-02 09:09:50
    42Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $  University of Massachusetts, 01002 USA

    Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USA

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-10-02 11:24:39
      43On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

      On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

      Add to Reading List

      Source URL: www.anagram.com

      - Date: 2010-11-11 14:43:00
        44A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

        A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-07-04 10:02:28
          45A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

          A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

          Add to Reading List

          Source URL: www.cs.jhu.edu

          - Date: 2006-09-28 16:26:57
            46Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

            Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

            Add to Reading List

            Source URL: www.iaik.tugraz.at

            - Date: 2015-09-08 06:00:03
              47Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

              Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2006-03-27 04:46:14
                48Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

                Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

                Add to Reading List

                Source URL: cs.tau.ac.il

                Language: English - Date: 2009-06-25 15:56:23
                49DayAfternoon I 14:30 – 16:00

                DayAfternoon I 14:30 – 16:00

                Add to Reading List

                Source URL: www.isical.ac.in

                Language: English