Semantic Scholar uses AI to extract papers important to this topic.
Shannon's pessimistic theorem, which states that a cipher can be perfect only when the entropy of the secret key is at least as… Expand Contents Preface to the Revised Edition Preface to the First Edition. 1 Introduction. 2 Stream Ciphers. 3 Primes, Primitive Roots… Expand In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… Expand A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand This thesis contains a new approach to design block ciphers, synchronous and self-synchronizing stream ciphers and cryptographic… Expand We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is… Expand We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving… Expand A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand