Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256… 
Highly Cited
2012
Highly Cited
2012
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a… 
2012
2012
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
Highly Cited
2005
Highly Cited
2005
Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by Braeken, Lano, Preneel et al. The designers… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
1983
1983
The ability to “hide” one bit in trapdoor functions has recently gained much interest in cryptography research, and is of great…