Cryptanalysis

Results: 756



#Item
171BRICS  Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security  From Known-Plaintext Security to

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 09:17:54
172A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
173Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1998-04-13 22:10:00
174

Reference Papers [S1] Biryukov, Shamir, 展agner: Real Time Cryptanalysis of A5/1 on a PC, FSE2000 [S2] Canteaut, Filiol, 鼎iphertext Only Reconstruction of Stream Ciphers based on Combination Generator, FSE2000 [S3] Ch

Add to Reading List

Source URL: www.ipa.go.jp

- Date: 2013-06-19 04:38:45
    175CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic and Amparo Fuster-Sabater Abstract - An attack on the A5/2 stream cipher algorithm is described,  that determines the linear relations among the output sequence b

    CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic and Amparo Fuster-Sabater Abstract - An attack on the A5/2 stream cipher algorithm is described, that determines the linear relations among the output sequence b

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2000-10-11 05:03:34
      176Hidden Markov Model Cryptanalysis  Chris Karlof David Wagner

      Hidden Markov Model Cryptanalysis Chris Karlof David Wagner

      Add to Reading List

      Source URL: www.chriskarlof.com

      - Date: 2012-01-02 15:39:50
        177Cryptanalysis of Grain Cˆ ome Berbain1 , Henri Gilbert1 , and Alexander Maximov2 1  France Telecom Research and Development

        Cryptanalysis of Grain Cˆ ome Berbain1 , Henri Gilbert1 , and Alexander Maximov2 1 France Telecom Research and Development

        Add to Reading List

        Source URL: www.iacr.org

        - Date: 2008-09-15 00:54:52
          178Cryptanalysis of Stream Cipher

          Cryptanalysis of Stream Cipher

          Add to Reading List

          Source URL: www.iacr.org

          - Date: 2007-06-12 08:55:05
            179Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

            Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

            Add to Reading List

            Source URL: www.ipa.go.jp

            Language: English - Date: 2013-06-19 04:38:45
              180Introduction Description Strategy Attack  Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Ecole normale supérieure, Paris

              Introduction Description Strategy Attack Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Ecole normale supérieure, Paris

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-06-12 08:53:17