Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,436,978 papers from all fields of science
Search
Sign In
Create Free Account
Cryptologia
Cryptologia is a journal in cryptography published quarterly since January 1977. Its remit is all aspects of cryptography, but there is a special…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Bomba (cryptography)
Cipher
Cryptanalysis
Cryptanalysis of the Enigma
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Designing generic asymmetric key cryptosystem with message paddings
Tarun Kumar Bansal
2017
Corpus ID: 196056094
This thesis focuses on structural remodelling and security proof of cryptographic schemes. A message pre-processing, also known…
Expand
2011
2011
Key Management in Mobile Sensor Networks
A. Aileni
arXiv.org
2011
Corpus ID: 17602794
Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. This paper deals with…
Expand
2009
2009
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Xiaoyun Wang
,
Hongbo Yu
,
Wei Wang
,
Haina Zhang
,
T. Zhan
International Conference on the Theory and…
2009
Corpus ID: 9587740
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes…
Expand
2005
2005
ENIGMA ARTICLES FROM CRYPTOLOGIA
L. Kruh
Cryptologia
2005
Corpus ID: 38963692
A DC arc suppression circuit is disclosed for suppressing arcs which occur across a mechanical switch or circuit breaker. Several…
Expand
2005
2005
Sabbia: a low-latency design for anonymous networks
C. Agosti
,
S. Zanero
2005
Corpus ID: 16204120
. We present Sabbia, a novel approach for building a low latency anonymous network. Sabbia is characterized by a simple design…
Expand
2005
2005
Security evaluation of email encryption using random noise generated by LCG
Chung-Chih Li
,
Hema Sagar R. Kandati
,
Bo Sun
2005
Corpus ID: 18898488
Theoretically, using any Linear Congruence Generator (LCG) to generate pseudo-random numbers for cryptographic purposes is…
Expand
2004
2004
Necessary and Sufficient Numbers of Cards for the Transformation Protocol
Koichi Koizumi
,
T. Mizuki
,
Takao Nishizeki
International Computing and Combinatorics…
2004
Corpus ID: 2941354
The transformation protocol can make two players share a secret key using a random deal of cards. A sufficient condition on the…
Expand
1998
1998
Selections from Cryptologia: History, People, and Technology
C. Deavours
,
D. Kahn
,
L. Kruh
,
G. Mellen
,
B. J. Winkel
1998
Corpus ID: 106429237
This is a collection of articles and professional papers from "Cryptologia", a journal which focuses on the history and…
Expand
1992
1992
Some Number-theoretic Conjectures and Their Relation to the Generation of Cryptographic Primes 1
Ueli M. MaurerInstitute
1992
Corpus ID: 16944621
The purpose of this paper is to justify the claim that a method for generating primes presented at EUROCRYPT'89 generates primes…
Expand
1990
1990
Chaocipher Enters the Computer Age when its Method is disclosed to Cryptologia Editors
John Byrne
,
C. Deavours
,
L. Kruh
Cryptologia
1990
Corpus ID: 38991920
John F. Byrne invented Chaocipher in 1918 and tried unsuccessfully for almost 40 years to interest the U.S. government in his…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE