Search Results - "Cryptanalysis"
-
1
-
2
-
3
Cryptanalysis of the SHMW signature scheme
Published 2024“…This approach exploits the extra information in the signature to compute an intersection space that contains the secret key. Consequently, a cryptanalysis of the SHMW signature scheme was carried out to demonstrate the insecurity of the selected keys within the SHWM scheme. …”
Get full text
Get full text
-
4
Cryptanalysis in cryptographic algorithm design
Published 2006“…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
Get full text
-
5
-
6
New directions in cryptanalysis of block ciphers.
Published 2009“…This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. …”
Get full text
Get full text
-
7
-
8
-
9
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
Published 2005“…Our main position is that one should view block cipher cryptanalysis as an interelation of many techniques and not just one in isolation, e.g. slightly changing the properties of one would result in another; and that cipher security should be considered with respect to the environment which they are used in relation to other primitives.…”
Get full text
-
10
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
Published 2002“…In this thesis, we focus our attention on the cryptanalysis of secret-key block ciphers. We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
Get full text
-
11
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
Published 2002“…In this thesis, we focus our attention on the cryptanalysis of secret-key block ciphers. We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
Get full text
-
12
A framework for describing block cipher cryptanalysis
Published 2006“…The problem for an aspiring cipher designer is that there are no standard texts on block cipher cryptanalysis because it is a fast changing field. The commonly available references are academic journals and conference proceedings, which may not be easy to grasp for researchers new to cryptanalysis. …”
Get full text
Get full text
-
13
An updated cryptanalysis on the BFHP-DLP signing scheme
Published 2022“…This paper presents new cryptanalysis of the signing scheme. While the previous cryptanalysis focused only on BFHP, the obtained new results showed some improvement by scrutinizing the other difficult mathematical problem, DLP. …”
Get full text
-
14
Cryptanalysis of polynomial reconstruction problem based cryptosystems
Published 2023Subjects: Get full text
Get full text
-
15
-
16
Cryptanalysis using biological inspired computing approaches
Published 2006“…In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods. …”
Get full text
Get full text
-
17
-
18
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
Published 2007“…In this thesis, we focus on the design and cryptanalysis of signature and encryption schemes without certificates, particularly the identity-based and certificateless schemes. …”
Get full text
-
19
-
20