Cryptanalysis

Results: 756



#Item
571OSI protocols / Secure voice / Modulation / Linear feedback shift register / Cryptanalysis / Frequency-hopping spread spectrum / Voice inversion / Cryptography / Scrambler / Technology

Selected Comments on Scrambler Security James E. Gilley Chief Scientist

Add to Reading List

Source URL: www.efjohnsontechnologies.com

Language: English - Date: 2008-08-18 18:08:05
572Advanced Encryption Standard / MISTY1 / Triple DES / Block cipher / Horst Feistel / Feistel / Differential cryptanalysis / Camellia / Encryption by date / Cryptography / Data Encryption Standard / Feistel cipher

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
573Chosen-plaintext attack / Ciphertext / Cryptanalysis / RSA / Four-square cipher / Two-square cipher / Cryptography / Data Encryption Standard / Tiny Encryption Algorithm

OWN33 Powers of t 0

Add to Reading List

Source URL: cs.jhu.edu

Language: English - Date: 2008-11-17 00:24:59
574Stream ciphers / Impossible differential cryptanalysis / Block cipher / XTEA / Cryptanalysis / Tiny Encryption Algorithm / Cipher / Decorrelation theory / VEST / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Zero Correlation Linear Cryptanalysis with Reduced Data Complexity Andrey Bogdanov1 and Meiqin Wang1,2

Add to Reading List

Source URL: www2.compute.dtu.dk

Language: English - Date: 2012-09-07 13:56:33
575NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-07 10:17:20
576Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
577Cryptanalysis / Cryptology / Differential cryptanalysis / Data Encryption Standard / Linear cryptanalysis / Perceptron / Neural cryptography / Book:Cryptography / Cryptography / Neural networks / Computational neuroscience

Maîtrise Informatique Option Micro-informatique Micro-électronique Année[removed]

Add to Reading List

Source URL: s.dourlens.free.fr

Language: English - Date: 2013-12-03 09:32:32
578Public-key cryptography / Elliptic curve / Cryptanalysis / Curve / Cipher / IEEE P1363 / ECC patents / Key size / Cryptography / Finite fields / Elliptic curve cryptography

Security dangers of the NIST curves Daniel J. Bernstein, Tanja Lange

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2013-06-08 20:02:29
579Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-09-25 20:40:23
580Stream ciphers / Threefish / Skein / ICE / VEST / SHA-2 / SHA-1 / Block cipher / Salsa20 / Cryptography / Error detection and correction / Cryptographic hash functions

Improved Cryptanalysis of Skein 3 ¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-08 02:25:05
UPDATE