Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,845,574 papers from all fields of science
Search
Sign In
Create Free Account
Cryptanalysis
Known as:
Cryptoanalyst
, Cryptographic attack
, Code-breaking
Expand
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
Banburismus
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Joint SPIHT compression and selective encryption
Tao Xiang
,
Jinyu Qu
,
D. Xiao
Applied Soft Computing
2014
Corpus ID: 11653537
Highly Cited
2012
Highly Cited
2012
Improved zero-sum distinguisher for full round Keccak-f permutation
Ming Duan
,
Xuejia Lai
IACR Cryptology ePrint Archive
2012
Corpus ID: 6047971
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a…
Expand
2012
2012
Image encryption using random pixel permutation by chaotic mapping
G. Sathishkumar
,
S. Ramachandran
,
K. Bhoopathy Bagan
International Conference on Smart City and…
2012
Corpus ID: 14754285
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission…
Expand
2010
2010
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
Kiran Kumar M
,
Mukthyar Azam S
,
S. Rasool
2010
Corpus ID: 16439438
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted…
Expand
2007
2007
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
Hongxia Jin
,
J. Lotspiech
European Symposium on Research in Computer…
2007
Corpus ID: 34245093
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or…
Expand
Highly Cited
2005
Highly Cited
2005
Cryptanalysis of Sfinks
N. Courtois
International Conference on Information Security…
2005
Corpus ID: 12484157
Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by Braeken, Lano, Preneel et al. The designers…
Expand
2004
2004
An Identity Based Encryption system
L. Owens
,
A. Duffy
,
T. Dowling
Principles and Practice of Programming in Java
2004
Corpus ID: 8779959
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
1991
1991
A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction
M. Mihaljević
,
J. Golic
International Conference on the Theory and…
1991
Corpus ID: 46593972
A cryptanalytic problem of a linear feedback shift register initial state reconstruction using a noisy output sequence is…
Expand
1983
1983
On the cryptographic security of single RSA bits
M. Ben-Or
,
B. Chor
,
A. Shamir
Symposium on the Theory of Computing
1983
Corpus ID: 10042586
The ability to “hide” one bit in trapdoor functions has recently gained much interest in cryptography research, and is of great…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE