Cryptanalysis

Results: 756



#Item
631Tiger / SHA-1 / MD5 / Differential cryptanalysis / Block cipher / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / MD4

Collisions and Near-Collisions for Reduced-Round Tiger John Kelsey1 , Stefan Lucks2

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-03-09 11:16:09
632Hashing / SHA-1 / SHA-2 / Collision attack / MD4 / Preimage attack / MD5 / Hash function / Collision resistance / Error detection and correction / Cryptography / Cryptographic hash functions

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
633Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
634Cryptanalysis / One-way function / Key / Cryptographic protocol / Password / Cryptosystem / RSA / Index of cryptography articles / Paillier cryptosystem / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-10-22 12:01:39
635Cryptanalysis / Cryptology / Symbol / Cryptography / Physics / Analysis / Nicomachean Ethics / Code / Science / Knowledge / Ethology

Author manuscript, published in "Studies in History and Philosophy of Sciences[removed]289." Fran¸cois Vi`ete

Add to Reading List

Source URL: halshs.archives-ouvertes.fr

Language: English - Date: 2013-09-03 09:37:20
636Cryptanalysis / Cipher / Vigenère cipher / Alberti cipher disk / Cryptography / Chaocipher / Cyberwarfare

CHAOCIPHER REVEALED: THE ALGORITHM Moshe Rubin

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2010-08-02 09:32:17
637Cyberwarfare / Information operations / Intelligence / Information warfare / United States Air Force / Ultra / War / Cryptanalysis / Network-centric warfare / Military science / Military intelligence / National security

AIR WAR COLLEGE AIR UNIVERSITY

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 11:02:09
638Differential cryptanalysis / Key schedule / Stream ciphers / Serpent / Q / Advanced Encryption Standard / ICE / Cipher / SC2000 / Cryptography / Block ciphers / Linear cryptanalysis

PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2

Add to Reading List

Source URL: www.ist-ubisecsens.org

Language: English - Date: 2009-04-14 16:49:11
639Key management / Integer factorization algorithms / RSA / Strong prime / Key / Cipher / Cryptanalysis / RSA Factoring Challenge / RSA numbers / Cryptography / Public-key cryptography / Electronic commerce

IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Online): [removed]www.IJCSI.org

Add to Reading List

Source URL: www.ijcsi.org

Language: English - Date: 2012-04-04 19:55:03
640Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
UPDATE