Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,097,256 papers from all fields of science
Search
Sign In
Create Free Account
Cryptanalysis
Known as:
Cryptoanalyst
, Cryptographic attack
, Code-breaking
Expand
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
Banburismus
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Joint SPIHT compression and selective encryption
Tao Xiang
,
Jinyu Qu
,
D. Xiao
Applied Soft Computing
2014
Corpus ID: 11653537
2014
2014
Preimage Attacks on Reduced-Round Stribog
Riham Altawy
,
A. Youssef
International Conference on Cryptology in Africa
2014
Corpus ID: 9950670
In August 2012, the Stribog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012…
Expand
2010
2010
Chaotic image encryption algorithm based on frequency domain scrambling
Musheer Ahmad
,
Omar Farooq
,
J. Blackledge
2010
Corpus ID: 7912965
This letter proposes an image encryption algorithm using scrambling by exploiting the features of chaotic maps suited for…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
K. M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
2010
2010
Energy Harvesting via Piezoelectricity
Tanvi Dikshit
,
Dhawal Shrivastava
,
A. Gorey
,
Ashish Gupta
,
Parag Parandkar
,
S. Katiyal
2010
Corpus ID: 110366276
In the present era, wireless data transmission techniques are commonly used in electronic devices. For powering them connection…
Expand
2010
2010
A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme
F. Ahmed
,
M. Siyal
,
V. Abbas
Fourth Pacific-Rim Symposium on Image and Video…
2010
Corpus ID: 15300674
In this paper, a perceptually scalable and JPEG compression tolerant DCT-based image encryption scheme is proposed. There are two…
Expand
2009
2009
Software and Hardware Issues in Smart Card Technology
G. Selimis
,
A. Fournaris
,
G. Kostopoulos
,
O. Koufopavlou
IEEE Communications Surveys and Tutorials
2009
Corpus ID: 28255894
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of…
Expand
2007
2007
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
Hongxia Jin
,
J. Lotspiech
European Symposium on Research in Computer…
2007
Corpus ID: 34245093
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
1999
1999
Computational Verb Systems: Modeling with Verbs and Applications
Ta-lun Yang
Information Sciences
1999
Corpus ID: 45128275
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE