Results 101 to 110 of about 3,178 (206)
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map. [PDF]
Zhang C, Chen J, Chen D.
europepmc +1 more source
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes
We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes.
Couvreur, Alain +2 more
core +1 more source
Quantum Neural Network Based Distinguisher on SPECK-32/64. [PDF]
Kim H +5 more
europepmc +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis. [PDF]
Fang X, Zhang H, Cui X, Wang Y, Ding L.
europepmc +1 more source
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. [PDF]
Ali A, Khan MA, Ayyasamy RK, Wasif M.
europepmc +1 more source
The Odyssey of Entropy: Cryptography. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source
A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing. [PDF]
Huo D +6 more
europepmc +1 more source

