Results 141 to 150 of about 44,378 (278)

A NICE Cryptanalysis [PDF]

open access: bronze, 2000
Éliane Jaulmes, Antoine Joux
openalex   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

Structural Cryptanalysis of SASAS [PDF]

open access: bronze, 2001
Alex Biryukov, Adi Shamir
openalex   +1 more source

Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps [PDF]

open access: yesJournal of Information Security and Applications, 2019
Yunling Ma, Chengqing Li
semanticscholar   +1 more source

Comments on “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs”

open access: yesIEEE Access
In the above paper “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs,” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed.
Je Hong Park, Bonwook Koo
doaj   +1 more source

Home - About - Disclaimer - Privacy