Counter-Cryptanalysis
From MaRDI portal
Publication:2845665
Recommendations
- Public-key cryptanalysis
- scientific article; zbMATH DE number 2089131
- Cryptanalysis of Ciminion
- Cryptanalysis of C2
- scientific article; zbMATH DE number 1024102
- Cryptanalysis of multiple modes of operation
- Attacking block ciphers
- Cryptanalysis of a homomorphic encryption scheme
- Cryptanalysis of CTC2
Cited in
(7)- Collapseability of tree hashes
- Reverse-engineering of the cryptanalytic attack used in the flame super-malware
- scientific article; zbMATH DE number 1759669 (Why is no real title available?)
- scientific article; zbMATH DE number 3854959 (Why is no real title available?)
- Cryptographic defense against traffic analysis
- Improved collision detection of MD5 with additional sufficient conditions
- Practical free-start collision attacks on 76-step SHA-1
This page was built for publication: Counter-Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845665)