Cryptanalysis

Results: 756



#Item
41

Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

Add to Reading List

Source URL: www.nku.edu

- Date: 2015-03-02 09:09:50
    42

    Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USA

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-10-02 11:24:39
      43

      On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

      Add to Reading List

      Source URL: www.anagram.com

      - Date: 2010-11-11 14:43:00
        44

        A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht1? , Shi Bai2?? , and L´eo Ducas3? ? ? 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-07-04 10:02:28
          45

          A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

          Add to Reading List

          Source URL: www.cs.jhu.edu

          - Date: 2006-09-28 16:26:57
            46

            Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

            Add to Reading List

            Source URL: www.iaik.tugraz.at

            - Date: 2015-09-08 06:00:03
              47

              Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2006-03-27 04:46:14
                48Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

                Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

                Add to Reading List

                Source URL: cs.tau.ac.il

                Language: English - Date: 2009-06-25 15:56:23
                49Cryptography / Food and drink / Government of Pakistan / Tea culture / Tea / Tea ceremony / Inter-Services Intelligence / Lunch / Cryptanalysis / Gupta / Tiny Encryption Algorithm

                DayAfternoon I 14:30 – 16:00

                Add to Reading List

                Source URL: www.isical.ac.in

                Language: English
                UPDATE