Search
Selected: All

Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of an image encryption scheme based on the Hill cipher

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of group-based key agreement protocols using subgroup distance functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of HFE

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of SDES via evolutionary computation techniques

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Song's advanced smart card based password authentication protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the CFVZ cryptosystem

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the RSA-CEGD protocol

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of two mutual authentication protocols for low-cost RFID

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic Authentication of Navigation Protocols

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic Hardening of d-Sequences

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic Implications for Artificially Mediated Games

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptography for Multi-Located Parties

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.