Search Results - "Cryptanalysis"

Refine Results
  1. 1
  2. 2
  3. 3

    Cryptanalysis of the SHMW signature scheme by Lau, Terry Shue Chien, Kamel Ariffin, Muhammad Rezal, Yip, Sook-Chin, Chin, Ji-Jian, Ting, Choo-Yee

    Published 2024
    “…This approach exploits the extra information in the signature to compute an intersection space that contains the secret key. Consequently, a cryptanalysis of the SHMW signature scheme was carried out to demonstrate the insecurity of the selected keys within the SHWM scheme. …”
    Get full text
    Get full text
  4. 4

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
    Get full text
  5. 5
  6. 6

    New directions in cryptanalysis of block ciphers. by RezaeiPour , Davood, Md Said, Mohamad Rushdan

    Published 2009
    “…This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. …”
    Get full text
    Get full text
  7. 7
  8. 8
  9. 9

    Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration by Phan, Raphael Chung Wei

    Published 2005
    “…Our main position is that one should view block cipher cryptanalysis as an interelation of many techniques and not just one in isolation, e.g. slightly changing the properties of one would result in another; and that cipher security should be considered with respect to the environment which they are used in relation to other primitives.…”
    Get full text
  10. 10

    Cryptanalysis Of The Advanced Encription Standard & Skip Jack by Phan, Raphael Chung We

    Published 2002
    “…In this thesis, we focus our attention on the cryptanalysis of secret-key block ciphers. We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
    Get full text
  11. 11

    Cryptanalysis Of The Advanced Encription Standard & Skip Jack by Phan, Raphael Chung Wei

    Published 2002
    “…In this thesis, we focus our attention on the cryptanalysis of secret-key block ciphers. We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
    Get full text
  12. 12

    A framework for describing block cipher cryptanalysis by Phan, Raphael C. W., Siddiqi, Mohammad Umar

    Published 2006
    “…The problem for an aspiring cipher designer is that there are no standard texts on block cipher cryptanalysis because it is a fast changing field. The commonly available references are academic journals and conference proceedings, which may not be easy to grasp for researchers new to cryptanalysis. …”
    Get full text
    Get full text
  13. 13

    An updated cryptanalysis on the BFHP-DLP signing scheme by Abd Ghafar, Amir Hamzah, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf, Alias, Idham Arif

    Published 2022
    “…This paper presents new cryptanalysis of the signing scheme. While the previous cryptanalysis focused only on BFHP, the obtained new results showed some improvement by scrutinizing the other difficult mathematical problem, DLP. …”
    Get full text
  14. 14
  15. 15
  16. 16

    Cryptanalysis using biological inspired computing approaches by Ahmad, Badrisham, Maarof, Mohd. Aizaini

    Published 2006
    “…In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods. …”
    Get full text
    Get full text
  17. 17
  18. 18

    Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates by Yap, Wun She

    Published 2007
    “…In this thesis, we focus on the design and cryptanalysis of signature and encryption schemes without certificates, particularly the identity-based and certificateless schemes. …”
    Get full text
  19. 19
  20. 20