Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256… 
Highly Cited
2012
Highly Cited
2012
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a… 
2012
2012
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
2009
2009
Abstract We introduce a method for solving substitution ciphers using low-order letter n-gram models. This method enforces global… 
2009
2009
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an… 
Highly Cited
2005
Highly Cited
2005
Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by Braeken, Lano, Preneel et al. The designers… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…