Results 191 to 200 of about 44,378 (278)
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan [PDF]
Simon R. Blackburn⋆ +1 more
openalex +1 more source
This thesis consists of an introductory part of how the symmetric cipher AES works in detail and how truncated differential cryptanalysis can be used to break some round reduced versions of AES. All the main attacks in this analysis has been successfully implemented using C#, and we have improved the overall data complexity of the attack from 2^11.3 ...
openaire +1 more source
Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits. [PDF]
Cai XQ, Li S, Liu ZF, Wang TY.
europepmc +1 more source
A note on the analysis of Herrmann-May lattices for small exponent RSA. [PDF]
Kalam A, Karmakar S, Sarkar S.
europepmc +1 more source
Securing digital images: A chaos-driven scrambling algorithm using the Rössler system. [PDF]
Zulfiqar N +7 more
europepmc +1 more source
A novel chaos-based approach for constructing lightweight S-Boxes. [PDF]
Tolpa SH +3 more
europepmc +1 more source
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004 [PDF]
Bok‐Min Goi +2 more
openalex +1 more source

