Results 111 to 120 of about 6,764 (215)

Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser

open access: yes, 2011
The Algebraic Eraser (AE) is a public key protocol for sharing information over an insecure channel using commutative and noncommutative groups; a concrete realization is given by Colored Burau Key Agreement Protocol (CBKAP).
Goldfeld, Dorian, Gunnells, Paul E.
core  

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES

open access: gold, 2022
Marek Bielik   +3 more
openalex   +1 more source

Fully Dynamic Advanced Encryption Standard

open access: yesIEEE Access
As the reliance on using electronic services increases, the use of a strong encryption algorithm becomes paramount. The AES is the most widely used cipher. However, AES uses static transformations that attackers might exploit to cryptanalyze AES. In this
Shiraz Naserelden   +3 more
doaj   +1 more source

Interactions Between Brauer Configuration Algebras and Classical Cryptanalysis to Analyze Bach's Canons [PDF]

open access: green
Agustín Moreno Cañadas   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy