Sciweavers

427 search results - page 47 / 86
» Cryptanalysis of the
Sort
View
ICISC
2007
125views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
FLAIRS
2003
13 years 9 months ago
A Word-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms
This paper demonstrates the feasibility of a word-based genetic algorithm (GA) for solving short substitution cryptograms such as the kind found in newspapers and puzzle books. Al...
Ralph Morelli, Ralph Walde
WEWORC
2007
129views Cryptology» more  WEWORC 2007»
13 years 9 months ago
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
María Naya-Plasencia
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 8 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
212views Education» more  CORR 2010»
13 years 8 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...