Sciweavers

427 search results - page 52 / 86
» Cryptanalysis of the
Sort
View
JOC
2008
92views more  JOC 2008»
13 years 8 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
JEI
2006
78views more  JEI 2006»
13 years 8 months ago
Cryptanalysis of an image encryption scheme
Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Ch...
JISE
2006
66views more  JISE 2006»
13 years 8 months ago
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem
Jaime Muñoz Masqué, Alberto Peinado
JSS
2006
65views more  JSS 2006»
13 years 8 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
IEEESP
2007
53views more  IEEESP 2007»
13 years 7 months ago
Micro-Architectural Cryptanalysis
Onur Acucmez, Jean-Pierre Seifert, Çetin Ka...