Cryptanalysis

Results: 756



#Item
14128 August, 2013 ASK 2013 @ Weihai, China Recent Cryptanalysis of RC4 Stream Cipher Takanori Isobe

28 August, 2013 ASK 2013 @ Weihai, China Recent Cryptanalysis of RC4 Stream Cipher Takanori Isobe

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2015-09-17 19:41:23
    142Computational Aspects of Cryptography and Cryptanalysis

    Computational Aspects of Cryptography and Cryptanalysis

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 21:59:21
      143Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou1,2 , Le Dong3 1  Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108

      Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou1,2 , Le Dong3 1 Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-10-02 05:54:11
        144Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

        Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-24 15:27:13
          145Cryptanalysis of INCrypt32 in HID’s iCLASSTM Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han ETRI, Korea {kimck, egjung, dlee, zangho, dwh}@ensec.re.kr

          Cryptanalysis of INCrypt32 in HID’s iCLASSTM Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han ETRI, Korea {kimck, egjung, dlee, zangho, dwh}@ensec.re.kr

          Add to Reading List

          Source URL: www.proxmark.org

          Language: English - Date: 2012-05-16 05:55:43
            146Introduction HTTM Signature Scheme Cryptanalysis of HTTM Conclusion  Cryptanalysis of Hash-based Tamed

            Introduction HTTM Signature Scheme Cryptanalysis of HTTM Conclusion Cryptanalysis of Hash-based Tamed

            Add to Reading List

            Source URL: pqcrypto2013.xlim.fr

            Language: English - Date: 2013-06-24 09:56:19
              147Published in R. Whright and P. Neumann, Eds., Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 38, pp. 21–31, American Mathematical Society, 1998. CRYPTANALYSIS OF RSA-TYPE

              Published in R. Whright and P. Neumann, Eds., Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 38, pp. 21–31, American Mathematical Society, 1998. CRYPTANALYSIS OF RSA-TYPE

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:43:59
                148Linearization and Message Modification Techniques for Hash Function Cryptanalysis

                Linearization and Message Modification Techniques for Hash Function Cryptanalysis

                Add to Reading List

                Source URL: web.spms.ntu.edu.sg

                Language: English
                  149Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

                  Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

                  Add to Reading List

                  Source URL: www1.spms.ntu.edu.sg

                  Language: English - Date: 2015-10-05 00:19:26
                    150Linear Cryptanalysis Kaisa Nyberg Department of Computer Science Aalto University School of Science ❦❛✐s❛✳♥②❜❡r❣❅❛❛❧t♦✳❢✐ S3, Sackville, August 11, 2015

                    Linear Cryptanalysis Kaisa Nyberg Department of Computer Science Aalto University School of Science ❦❛✐s❛✳♥②❜❡r❣❅❛❛❧t♦✳❢✐ S3, Sackville, August 11, 2015

                    Add to Reading List

                    Source URL: mta.ca

                    Language: English - Date: 2015-08-17 19:57:43