Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,975,768 papers from all fields of science
Search
Sign In
Create Free Account
Cryptanalysis
Known as:
Cryptoanalyst
, Cryptographic attack
, Code-breaking
Expand
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
Banburismus
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP
Arijit Ukil
,
S. Bandyopadhyay
,
Abhijan Bhattacharyya
,
A. Pal
,
Tulika Bose
IEEE International Conference on Pervasive…
2014
Corpus ID: 17316137
The resource constrained characteristic of M2M systems has made secure channel establishment for sensor data communication a…
Expand
2014
2014
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach
G. Lasry
,
Nils Kopal
,
Arno Wacker
Cryptologia
2014
Corpus ID: 7946904
Abstract The double transposition cipher was considered to be one of the most secure types of manual ciphers. It was extensively…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
K. M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
2010
2010
Chaotic image encryption algorithm based on frequency domain scrambling
Musheer Ahmad
,
Omar Farooq
,
J. Blackledge
2010
Corpus ID: 7912965
This letter proposes an image encryption algorithm using scrambling by exploiting the features of chaotic maps suited for…
Expand
2009
2009
Software and Hardware Issues in Smart Card Technology
G. Selimis
,
A. Fournaris
,
G. Kostopoulos
,
O. Koufopavlou
IEEE Communications Surveys and Tutorials
2009
Corpus ID: 28255894
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of…
Expand
2007
2007
Applications of Cascade Correlation Neural Networks for Cipher System Identification
B. Chandra
,
P. P. Varghese
2007
Corpus ID: 14817649
— Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of…
Expand
2006
2006
Mathematical Attacks on RSA Cryptosystem
Imad Salah
,
A. Darwish
,
S. Oqeili
2006
Corpus ID: 17783133
In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe…
Expand
2005
2005
The Most Efficient Distinguishing Attack on VMPC and RC 4 A
Y. Tsunoo
,
Teruo Saito
,
Hiroyasu Kubo
,
Maki Shigeri
,
Tomoyasu Suzaki
,
Takeshi Kawabata
2005
Corpus ID: 17307830
This paper reports the greater bias found in the output sequence of VMPC, a modified RC4 stream cipher proposed in 2004. Using…
Expand
2004
2004
An Identity Based Encryption system
L. Owens
,
A. Duffy
,
T. Dowling
Principles and Practice of Programming in Java
2004
Corpus ID: 8779959
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement…
Expand
Review
2000
Review
2000
Overview of IEEE 802.11b Security
S. Weatherspoon
2000
Corpus ID: 15065327
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…
Expand