Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,476 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext-only attack
Known as:
COA
, Known-ciphertext
, Ciphertext only attack
Expand
In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Advanced Encryption Standard process
Attack model
Chosen-ciphertext attack
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain
J. Vilardy
,
M. S. Millán
,
E. Pérez-Cabré
2017
Corpus ID: 46028468
2011
2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem
Yanbin Pan
,
Yingpu Deng
IEEE Transactions on Information Theory
2011
Corpus ID: 7454780
In 1998, Cai and Cusick proposed a lattice-based public-key cryptosystem based on the similar ideas of the Ajtai-Dwork…
Expand
2011
2011
QSAR study of a series of acyl coenzyme A (CoA): cholesterol acyltransferase inhibitors using genetic function approximation
M. Chhabria
,
B. Mahajan
,
P. S. Brahmkshatriya
Medicinal Chemistry Research
2011
Corpus ID: 11342181
In cells, cholesterol esters are synthesized in an intracellular reaction catalyzed by acyl coenzyme A (CoA): cholesterol…
Expand
2010
2010
A ciphertext-only attack on Polly Two
R. Steinwandt
Applicable Algebra in Engineering, Communication…
2010
Corpus ID: 33581255
Polly Two is a public key encryption scheme that builds on the conceptual public key encryption scheme Polly Cracker. We describe…
Expand
2009
2009
Cache Timing Attacks on Camellia Block Cipher
Xin-jie Zhao
,
Tao Wang
,
Yuanyuan Zheng
IACR Cryptology ePrint Archive
2009
Corpus ID: 12037658
Camellia, as the final winner of 128-bit block cipher in NESSIE, is the most secure block cipher of the world. In 2003, Tsunoo…
Expand
2003
2003
Sequence variation in two lignin biosynthesis genes, cinnamoyl CoA reductase (CCR) and cinnamyl alcohol dehydrogenase 2 (CAD2)
Fiona S. Poke
,
R. Vaillancourt
,
R. Elliott
,
J. B. Reid
Molecular breeding
2003
Corpus ID: 6186641
Cinnamoyl CoA reductase (CCR) and cinnamyl alcohol dehydrogenase 2 (CAD2) are genes which may influence variation in lignin…
Expand
2001
2001
Sugarcane expressed sequences tags (ESTs) encoding enzymes involved in lignin biosynthesis pathways
R. L. B. Ramos
,
F. J. Tovar
,
R. Junqueira
,
Fabiane Borges Lino
,
Gilberto Sachetto-Martins
2001
Corpus ID: 55854571
Lignins are phenolic polymers found in the secondary wall of plant conductive systems where they play an important role by…
Expand
2000
2000
CIPHERTEXT-ONLY ATTACK ON AKELARRE
L. Knudsen
,
V. Rijmen
Cryptologia
2000
Corpus ID: 30403134
ABSTRACT At the SAC'96 the iterated block cipher, Akelarre, was proposed. Akelarre uses components of the block ciphers RC5 and…
Expand
1999
1999
Ciphertext Only Attack on LFSR Based Encryption Scheme
S. Maitra
,
Bimal Roy
,
P. Sarkar
1999
Corpus ID: 63812097
Here a security attack on LFSR based stream cipher systems is described. The attack depends on some weakness of the memory less…
Expand
1994
1994
Intrinsic Statistical Weakness of Keystream Generators
J. Golic
International Conference on the Theory and…
1994
Corpus ID: 45545464
It is shown that an arbitrary binary keystream generator with M bits of memory can be linearly modelled as a non-autonomous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE