Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This contribution presents a new approach to optimize the efficiency of differential side channel cryptanalysis against block… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In this paper we describe several fault attacks on the Ad- vanced Encryption Standard (AES). First, using optical/eddy current… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We improve the best attack on Rijndael reduced to 6 rounds from complexity 272 to 244. We also present the first known attacks on… Expand
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the… Expand
  • table 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this paper we present a new cryptanalytic technique, based on impossible differentials, and use it to show that Skipjack… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A binary stream cipher, known as A5, consisting of three short LFSRs of total length 64 that are mutually clocked in the stop/go… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
A cryptanalytic attack on the use of short RSA secret exponents is described. The attack makes use of an algorithm based on… Expand
  • table I
Is this relevant?