Cryptanalysis

Results: 756



#Item
501NTRU / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / RSA / Polynomial / Cryptography / Post-quantum cryptography / NTRUEncrypt

Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2011-09-02 16:54:04
502Rotor machines / Bletchley Park / Enigma machine / Marian Rejewski / Colossus computer / Cryptanalysis of the Enigma / Bombe / Cryptography / Espionage / Biuro Szyfrów

The Path to Colossus. … an historical look at the development of the electronic computer. A presentation to… Engineering Heritage Victoria

Add to Reading List

Source URL: www.consuleng.com.au

Language: English - Date: 2008-08-27 03:14:22
503Integer factorization algorithms / Finite fields / Euclidean algorithm / Continued fraction / Elliptic curve / Quadratic sieve / Lenstra elliptic curve factorization / XTR / Prime number / Mathematics / Abstract algebra / Number theory

Cryptanalysis of RSA Using the Ratio of the Primes Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2009-03-27 17:29:38
504Empiricists / Philosophers of science / Cryptography / Attorneys General for England and Wales / Francis Bacon / Cipher / Cryptanalysis / Bacon / Science / British people / English people

The Clue to the Labyrinth: Francis Bacon and the Decryption of Nature by Peter Pesic _______ originally published in

Add to Reading List

Source URL: www.francisbaconsociety.co.uk

Language: English - Date: 2013-11-06 11:19:05
505Science / Index of cryptography articles / Cryptography / Block cipher / Cryptanalysis

ECRYPT Workshop on Lightweight Cryptography. November 28-29, 2011, Louvain-la-Neuve, Belgium. Monday, November[removed]:[removed]:15 Registration. 09:[removed]:30 Opening remarks.

Add to Reading List

Source URL: www.uclouvain.be

Language: English - Date: 2011-12-14 05:31:20
506Cryptanalysis / E0 / Fluhrer /  Mantin and Shamir attack / Index of cryptography articles / Cryptography / Stream ciphers / Keystream

Microsoft PowerPoint - rump_zuc.pptx

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-06 23:30:32
507Advanced Encryption Standard / Cryptanalysis / Ciphertext-only attack / Ciphertext / Boomerang attack / Chosen-plaintext attack / Cipher / Data Encryption Standard / Serpent / Cryptography / Espionage / Differential cryptanalysis

Retro Cryptography „ What can YOU do with 1 Known Plaintext?

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-07 00:14:22
508Cryptanalysis / Key / Advanced Encryption Standard / Cipher / Data Encryption Standard / Public-key cryptography / Stream cipher / Outline of cryptography / Index of cryptography articles / Cryptography / Cryptosystem / Block cipher

Cryptographic Algorithms Revealed Greg Rose [removed] Apr-14-09

Add to Reading List

Source URL: seer-grog.net

Language: English - Date: 2009-04-14 12:48:05
509Cipher / SHA-1 / Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Cryptography / Mathematical sciences / Science

Draft revision: 3f5ad4f[removed]:38:47 +0200) Pepi Zawodsky Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, U

Add to Reading List

Source URL: bettercrypto.org

Language: English - Date: 2014-06-21 11:07:34
510Cryptography / Mathcad / International Cryptology Conference / Cryptanalysis / MATLAB / Software / Science / Computer algebra systems

Name Date of Birth: City: Mobile phone:

Add to Reading List

Source URL: pti.kpi.ua

Language: English - Date: 2014-06-10 06:36:56
UPDATE