Sciweavers

427 search results - page 32 / 86
» Cryptanalysis of the
Sort
View
ISNN
2005
Springer
14 years 1 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
WISA
2005
Springer
14 years 1 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
ASIACRYPT
2004
Springer
14 years 1 months ago
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Yi Lu 0002, Serge Vaudenay
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
14 years 1 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi