Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence
Cryptanalysis of an image encryption scheme based on the Hill cipher
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
Cryptanalysis of group-based key agreement protocols using subgroup distance functions
Cryptanalysis of HFE
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
Cryptanalysis of SDES via evolutionary computation techniques
Cryptanalysis of Song's advanced smart card based password authentication protocol
Cryptanalysis of the CFVZ cryptosystem
Cryptanalysis of the RSA-CEGD protocol
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
Cryptoendolith Communities in Antarctic Dry Valley Region Sandstones: Potential Analogues of Martian Life-Forms
Cryptographic Authentication of Navigation Protocols