Skip to search formSkip to main contentSkip to account menu

Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a… 
2012
2012
With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission… 
2010
2010
This letter proposes an image encryption algorithm using scrambling by exploiting the features of chaotic maps suited for… 
2010
2010
In this paper, a perceptually scalable and JPEG compression tolerant DCT-based image encryption scheme is proposed. There are two… 
2010
2010
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted… 
2007
2007
In this paper we design renewable traitor tracing scheme for anonymous attack. When pirated copies of some copyrighted content or… 
2007
2007
— Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show… 
1983
1983
The ability to “hide” one bit in trapdoor functions has recently gained much interest in cryptography research, and is of great…