Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,221,435 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext-only attack
Known as:
COA
, Known-ciphertext
, Ciphertext only attack
Expand
In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Advanced Encryption Standard process
Attack model
Chosen-ciphertext attack
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform
Leihong Zhang
,
Pan Zilan
,
Luying Wu
,
Xiuhua Ma
2016
Corpus ID: 63663106
2016
2016
POLYMORPHISM STEAROYL-COA DESATURASE (SCD) GENE AND ASSOCIATON WITH CHARACTERISTICS MEAT IN BALI CATTLE
A. Alwiyah
,
H. Naraini
,
P. P. Agung
,
J. Jakaria
2016
Corpus ID: 73516851
Stearoyl-CoA desaturase (SCD) is an enzyme produced by SCD gene which is responsible for a conversion of saturated fatty acids…
Expand
2010
2010
A ciphertext-only attack on Polly Two
R. Steinwandt
Applicable Algebra in Engineering, Communication…
2010
Corpus ID: 33581255
Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describe…
Expand
2006
2006
An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers
M. Uddin
,
A. Youssef
Canadian Conference on Electrical and Computer…
2006
Corpus ID: 16982257
In this paper, we investigate the use of ant colony optimization (ACO) for automated cryptanalysis of classical simple…
Expand
2005
2005
p 53-Defective Tumors With a Functional Apoptosome-Mediated Pathway : A New Therapeutic Target
T. Mashima
,
T. Oh‐hara
,
+11 authors
T. Tsuruo
2005
Corpus ID: 92981391
Background: Although cancer cells appear to maintain the machinery for intrinsic apoptosis, defects in the pathway develop during…
Expand
2002
2002
Inhibitors of sterol synthesis . Chemical synthesis , structure , and biological activities of ( 25 R )-3 & 26-di hydroxy-5 ~-cholest-8 ( 14 )-en-15-one , a metabdlite of 3 P-hydroxy-5 ~ ~-c holest-8…
Hong-Seok Kim
,
W. K. Wilson
,
+4 authors
G. Schroepfer
2002
Corpus ID: 50959465
3P-Hydroxy-5a-cholest-8(14)-en-15-one (I) is a potent inhibitor of sterol synthesis with significant hypocholesterolemic activity…
Expand
2001
2001
Sugarcane expressed sequences tags (ESTs) encoding enzymes involved in lignin biosynthesis pathways
R. L. B. Ramos
,
F. J. Tovar
,
R. Junqueira
,
Fabiane Borges Lino
,
Gilberto Sachetto-Martins
2001
Corpus ID: 55854571
Lignins are phenolic polymers found in the secondary wall of plant conductive systems where they play an important role by…
Expand
2000
2000
CIPHERTEXT-ONLY ATTACK ON AKELARRE
L. Knudsen
,
V. Rijmen
Cryptologia
2000
Corpus ID: 30403134
ABSTRACT At the SAC'96 the iterated block cipher, Akelarre, was proposed. Akelarre uses components of the block ciphers RC5 and…
Expand
1999
1999
Ciphertext Only Attack on LFSR Based Encryption Scheme
S. Maitra
,
Bimal Roy
,
P. Sarkar
1999
Corpus ID: 63812097
Here a security attack on LFSR based stream cipher systems is described. The attack depends on some weakness of the memory less…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE