Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a… 
2012
2012
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
2007
2007
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or… 
Highly Cited
2005
Highly Cited
2005
Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by Braeken, Lano, Preneel et al. The designers… 
2004
2004
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
1991
1991
A cryptanalytic problem of a linear feedback shift register initial state reconstruction using a noisy output sequence is… 
1983
1983
The ability to “hide” one bit in trapdoor functions has recently gained much interest in cryptography research, and is of great…