Showing 1 - 20 results of 20 for search '"Cryptanalysis"', query time: 0.03s Refine Results
  1. 1
  2. 2
    by Kahn
    Published 1991
    Subjects: “…Cryptanalysis of the enigma Cryptography…”
  3. 3
    by Singh
    Published 1999
    Subjects: “…Confidential communications Cryptanalysis Crytanalysis of the enigma…”
  4. 4
    “…, its security against cryptanalysis must be considered. History has shown that a cipher designed…”
    Get full text
    Get full text
    Get full text
    Get full text
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
    “… cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential…”
    Get full text
    Get full text
    Get full text
  10. 10
    “… that OLBCA is more secure than PRESENT in terms of (differential cryptanalysis, integral cryptanalysis…”
    Get full text
    Get full text
  11. 11
    “… or tampering, while cryptanalysis is art of breaking such secret ciphers and reading information, or perhaps…”
    Get full text
    Get full text
    Get full text
    Get full text
  12. 12
  13. 13
    by Taha, Imad, Salim, Sufyan
    Published 2012
    “… and differential cryptanalysis. The results show that there is conflict in one of the conditions of PRESENT S-box.…”
    Get full text
    Get full text
    Get full text
  14. 14
    “… enhances the stream cipher's immunity to cryptanalysis. This paper aims to provide a comprehensive survey…”
    Get full text
    Get full text
    Get full text
  15. 15
    “… of linear and differential cryptanalysis is showing that the proposed algo…”
    Get full text
    Get full text
    Get full text
    Get full text
  16. 16
    “… that could be launched against other related previous schemes. We present a detailed cryptanalysis…”
    Get full text
    Get full text
    Get full text
  17. 17
    “… stream ciphers were selected as the winners. These ciphers were subjected to rigorous cryptanalysis…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
  18. 18
    “… and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed…”
    Get full text
    Get full text
    Get full text
    Get full text
  19. 19
    “…. Weaknesses pinpointed in randomness properties of ZUC cipher may be exploited by statistical cryptanalysis…”
    Get full text
    Get full text
    Get full text
  20. 20
    “… is that it is difficult for an attacker to perform attacks such as differential cryptanalysis on the cipher since…”
    Get full text
    Get full text
    Get full text
    Get full text
Search Tools: RSS Feed Email Search