Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence
Cryptanalysis of an image encryption scheme based on the Hill cipher
Cryptanalysis of group-based key agreement protocols using subgroup distance functions
Cryptanalysis of HFE
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
Cryptanalysis of SDES via evolutionary computation techniques
Cryptanalysis of Song's advanced smart card based password authentication protocol
Cryptanalysis of the CFVZ cryptosystem
Cryptanalysis of the RSA-CEGD protocol
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
Cryptographic Authentication of Navigation Protocols
Cryptographic Hardening of d-Sequences
Cryptographic Implications for Artificially Mediated Games
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map
Cryptography for Multi-Located Parties
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers