Cryptanalysis

Results: 756



#Item
71Cryptography / Applied mathematics / Stream ciphers / Public-key cryptography / E-commerce / RSA / Cryptanalysis / Vigenre cipher / Block cipher / Cipher / Hill cipher / Finite field

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
72Mathematical optimization / Applied mathematics / Cryptography / Operations research / Search algorithms / Cryptanalysis / Metaheuristic / Linear cryptanalysis / Advanced Encryption Standard / Genetic algorithm

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
73Cryptography / Post-quantum cryptography / Quantum cryptography / Public-key cryptography / Lattice-based cryptography / NTRU / Quantum key distribution / Quantum computing / Elliptic curve cryptography / Key size / BLISS signature scheme / Cryptanalysis

Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:53
74

Cryptanalysis of the ESSENCE Family of Hash Functions? Nicky Mouha1,2,?? , Gautham Sekar1,2,? ? ? , Jean-Philippe Aumasson3,† , Thomas Peyrin4 , Søren S. Thomsen5 , Meltem S¨onmez Turan6 , and Bart Preneel1,2 1 5

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:42
    75

    CRYPTANALYSIS OF A HASH FUNCTION BASED ON NORM FORM EQUATIONS JEAN-PHILIPPE AUMASSON Abstract. The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the Unive

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:45
      76

      Cryptanalysis of Vortex∗ Jean-Philippe Aumasson1,† , Orr Dunkelman2,‡ , Florian Mendel3 , Christian Rechberger3 , and Søren S. Thomsen4 1 FHNW, Windisch, Switzerland ´

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:47
        77

        Improved cryptanalysis of Skein Jean-Philippe Aumasson ˘ ¸C C ¸ agdas ¸ alık

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:46:53
          78

          Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

          Add to Reading List

          Source URL: 131002.net

          Language: English - Date: 2012-08-14 06:46:48
            79

            Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) Jean-Philippe Aumasson1⋆ , Jorge Nakahara Jr.2⋆⋆ , and Pouyan Sepehrdad2 1 FHNW, Windisch, Switzerland

            Add to Reading List

            Source URL: 131002.net

            Language: English - Date: 2012-08-14 06:46:44
              UPDATE