Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant… 
Highly Cited
2009
Highly Cited
2009
In this work, we propose the rebound attack, a new tool for the cryptanalysis of hash functions. The idea of the rebound attack… 
Highly Cited
2005
Highly Cited
2005
This contribution presents a new approach to optimize the efficiency of differential side channel cryptanalysis against block… 
Highly Cited
2003
Highly Cited
2003
In this paper we describe several fault attacks on the Ad- vanced Encryption Standard (AES). First, using optical/eddy current… 
Highly Cited
2002
Highly Cited
2002
  • S. Li, Xuan Zheng
  • IEEE International Symposium on Circuits and…
  • 2002
  • Corpus ID: 14523625
The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In IS… 
Highly Cited
2000
Highly Cited
2000
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the… 
Highly Cited
2000
Highly Cited
2000
We improve the best attack on Rijndael reduced to 6 rounds from complexity 272 to 244. We also present the first known attacks on… 
Highly Cited
1998
Highly Cited
1998
Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation… 
Highly Cited
1997
Highly Cited
1997
  • J. Golic
  • EUROCRYPT
  • 1997
  • Corpus ID: 34165793
A binary stream cipher, known as A5, consisting of three short LFSRs of total length 64 that are mutually clocked in the stop/go… 
Highly Cited
1990
Highly Cited
1990
  • M. Wiener
  • IEEE Trans. Inf. Theory
  • 1990
  • Corpus ID: 7120331
A cryptanalytic attack on the use of short RSA secret exponents is described. The attack makes use of an algorithm based on…