Results 121 to 130 of about 33,779 (275)

Parallel cryptanalysis

open access: yes, 2012
Most of today’s cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time.
openaire   +1 more source

Cryptanalysis of an Elliptic Curve-based Signcryption Scheme [PDF]

open access: green, 2010
Mohsen Toorani   +1 more
openalex   +1 more source

On the independence heuristic in the dual attack

open access: yesJournal of Mathematical Cryptology
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj   +1 more source

Home - About - Disclaimer - Privacy