Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In August 2012, the Stribog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012… 
2010
2010
This letter proposes an image encryption algorithm using scrambling by exploiting the features of chaotic maps suited for… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
2010
2010
In the present era, wireless data transmission techniques are commonly used in electronic devices. For powering them connection… 
2010
2010
In this paper, a perceptually scalable and JPEG compression tolerant DCT-based image encryption scheme is proposed. There are two… 
2009
2009
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of… 
2007
2007
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…