Papers

With Tag: Cryptanalysis

Can't find what you are looking for? Add a listing here
Sort By
(0)

Cryptanalysis of an integrity checking scheme for cloud data sharing

Jining Zhao, Junwei Wen, Yuan Zhang, Xiaojun Zhang, Chunxiang Xu
2015 | 10.1016/j.jisa.2015.05.001

none

(0)

Update on tiger

2006

none

(0)

Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set

Rajat Subhra Chakraborty, D Mukhopadhyay, Durga Prasad Sahoo, Phuong Ha Nguyen
2015

none

(0)

On the security of blind signature and partially blind signature

Baoyuan Kang, Jinguang Han
2010 | 10.1109/ICETC.2010.5529783

none

(0)

Cryptanalysis of a homomorphic encryption scheme from ISIT 2008

Mingjie Liu, Jingguo Bi, Xiaoyun Wang
2012 | 10.1109/ISIT.2012.6283832

none

(0)

A novel approach of cryptanalysis using SOM

2008 | 10.1109/ICSMC.2008.4811611

none

(0)

Security of Group Key Exchange Protocols with Different Passwords

Raphael C W Phan
2009 | 10.1109/WAINA.2009.38

none

(0)

Reducing the Collision Probability of Alleged Comp128

Helena Handschuh, Pascal Paillier
1998

none

(0)

Breaking LFSR Using Genetic Algorithm

Mariusz Boryczka, Iwona Polak
2013 | 10.1007/978-3-642-40495-5_73

none

(0)

On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher

Jung Hwan Song, Hwan Seok Jang, Bon Wook Koo
2006 | 10.1007/11927587_7

none

(0)

Improved Impossible Differential Cryptanalysis of Rijndael and Crypton

Kwangjo Kim, Jungyeun Lee, Jung Hee Cheon, Sungwoo Kang, Munju Kim
2001 | 10.1007/3-540-45861-1_4

none

(0)

Improved Linear Cryptanalysis of SOSEMANUK

Joo Yeon Cho, Miia Hermelin
2010

none

(0)

Breaking Ciphers with COPACOBANA –A Cost-Optimized Parallel Code Breaker

J Pelzl, Sandeep Kumar, Christof Paar, Gerd Pfeiffer, Manfred Schimmler
2006

none

(0)

Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

Ding Wang, Deli Gu, Zhenshan Cui, Chunguang Ma
2012 | 10.1007/978-3-642-34601-9_35

none

(0)

An FPGA Implementation of the Linear Cryptanalysis

Jeandidier Legat, Gael Rouvroy, Jeanjacques Quisquater, Francoisxavier Standaert, Jeanpierre David, Francois Koeune
2002 | 10.1007/3-540-46117-5_87

none

(0)

Perseus on VoIP: Development and implementation of VoIP platforms

Eric Filiol, Bhume Bhumiratana, Saran Chiwtanasuntorn
2014 | 10.1109/ECTICon.2014.6839737

none

(0)

New impossible differential attacks of reduced-round Camellia-192 and Camellia-256

Keting Jia, Jiazhe Chen, Xiaoyun Wang, Hongbo Yu
2011 | 10.1007/978-3-642-22497-3_2

none

(0)

XXTEA, an alternative replacement of KASUMI cipher algorithm in A5/3 GSM and f8, f9 UMTS data security functions

Adrianviorel Diaconu, D Tarmurean, I Sima, Victor Greu
2012 | 10.1109/ICComm.2012.6262617

none

(0)

Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure

Huihui Yap, Guanhan Chew, Khoongming Khoo, Jiali Choy
2009 | 10.1007/978-3-642-02620-1_6

none

Can't find what you are looking for? Add a paper here