Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The resource constrained characteristic of M2M systems has made secure channel establishment for sensor data communication a… 
2014
2014
Abstract The double transposition cipher was considered to be one of the most secure types of manual ciphers. It was extensively… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
2010
2010
This letter proposes an image encryption algorithm using scrambling by exploiting the features of chaotic maps suited for… 
2009
2009
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of… 
2007
2007
— Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of… 
2006
2006
In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe… 
2005
2005
This paper reports the greater bias found in the output sequence of VMPC, a modified RC4 stream cipher proposed in 2004. Using… 
2004
2004
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement… 
Review
2000
Review
2000
There is much regulatory and standards work in the area of security, especially in wireless. The wireless LAN standard IEEE 802…