In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to haveâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2009

2009

- Rainer Steinwandt
- Applicable Algebra in Engineering, Communicationâ€¦
- 2009

Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describeâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- Jan Camenisch, Nishanth Chandran, Victor Shoup
- EUROCRYPT
- 2008

Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of â€œcircularâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Elad Barkan, Eli Biham, Nathan Keller
- Journal of Cryptology
- 2003

In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communicationsâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- Itsik Mantin, Adi Shamir
- FSE
- 2001

RC4 is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness inâ€¦Â (More)

Is this relevant?

2000

2000

- Lars R. Knudsen, Vincent Rijmen
- Cryptologia
- 2000

At the SAC'96 the iterated block cipher, Akelarre, was proposed. Akelarre uses components of the block ciphers RC5 and IDEA andâ€¦Â (More)

Is this relevant?

1998

1998

- Alex Biryukov, Eyal Kushilevitz
- CRYPTO
- 1998

We present a method for efficient conversion of differential (chosen plaintext) attacks into the more practical known plaintextâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- Daniel Bleichenbacher
- CRYPTO
- 1998

This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA privateâ€¦Â (More)

Is this relevant?

1998

1998

We present a method for eecient conversion of diierential (chosen-plaintext) attacks into the more practical known-plaintext andâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Paul C. Kocher
- CRYPTO
- 1996

By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellmanâ€¦Â (More)

Is this relevant?

Highly Cited

1985

Highly Cited

1985

- Thomas Siegenthaler
- IEEE Transactions on Computers
- 1985

Pseudonoise sequences generated by linear feedback shift registers [1] with some nonlinear combining function have been proposedâ€¦Â (More)

Is this relevant?