Cryptanalysis

Results: 756



#Item
251Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
252RSA / Digital signature / Cryptography / Public-key cryptography / Cryptanalysis

Microsoft Word - ACISP 2013 Program.docx

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2013-06-14 03:19:20
253Bletchley Park / Cyberwarfare / Enigma machine / Biuro Szyfrów / Cryptanalysis of the Enigma / Alan Turing / Cryptography / Espionage / Rotor machines

Enigma Officier and Staff Procedures 1940 formatted by Tony Sale (cCheck No. 790 Secret Command Material ! THE ENIGMA

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:13:22
254Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
255Advanced Encryption Standard / Block ciphers / S-box / Weak key / ICE / Differential cryptanalysis / Key size / MARS / Cryptanalysis / Cryptography / Key management / Twofish

Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
256Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
257Stream ciphers / Keystream

Cryptanalysis of TWOPRIME Don Coppersmith IBM Research David Wagner

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
258Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
259ICE / Ciphertext / Stream cipher / Chosen-plaintext attack / Blowfish / Cryptanalysis / Linear cryptanalysis / Cipher / Symmetric-key algorithm / Cryptography / Block cipher / Differential cryptanalysis

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
260Cipher / Cryptanalysis / Encryption / Espionage / Cryptography / Mathematical sciences / Science

Code Breakers The Great U-Boat Hunt Students will learn about the historical developments of cryptography and then apply this knowledge to decipher

Add to Reading List

Source URL: www.quantumvictoria.vic.edu.au

Language: English - Date: 2014-08-14 01:09:40
UPDATE