Results 121 to 130 of about 33,779 (275)
Most of today’s cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time.
openaire +1 more source
Separable Statistics and Multidimensional Linear Cryptanalysis
Stian Fauskanger, Igor Semaev
openalex +2 more sources
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme [PDF]
Mohsen Toorani +1 more
openalex +1 more source
On the independence heuristic in the dual attack
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj +1 more source
Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls
Malik Zia Ullah Bashir, Rashid Ali
openalex +2 more sources
Cryptanalysis of a multi-party quantum key agreement protocol with single particles [PDF]
Wei Huang +4 more
openalex +1 more source
Cryptanalysis of the Lightweight Block Cipher BORON [PDF]
Huicong Liang, Meiqin Wang
openalex +1 more source
‘Bright chaps for hush-hush jobs’:masculinity, class and civilians in uniform at Bletchley Park [PDF]
Smith, Christopher
core +1 more source
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cihangir Tezcan
openalex +2 more sources
A lightweight cryptographic algorithm incorporating path coloring of cartesian product of graphs. [PDF]
Shivapriya P, Meera KN, Lin Y.
europepmc +1 more source

