Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,894,041 papers from all fields of science
Search
Sign In
Create Free Account
Cryptanalysis
Known as:
Cryptoanalyst
, Cryptographic attack
, Code-breaking
Expand
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
Banburismus
Biclique attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
A. Tewari
,
B. Gupta
Journal of Supercomputing
2016
Corpus ID: 255072216
Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving…
Expand
Highly Cited
2016
Highly Cited
2016
Spritz - a spongy RC4-like stream cipher and hash function
R. Rivest
,
Jacob C. N. Schuldt
IACR Cryptology ePrint Archive
2016
Corpus ID: 17195661
This note reconsiders the design of the stream cipher RC4, and proposes an improved variant, which we call \Spritz" (since the…
Expand
Highly Cited
2012
Highly Cited
2012
Improved zero-sum distinguisher for full round Keccak-f permutation
Ming Duan
,
Xuejia Lai
IACR Cryptology ePrint Archive
2012
Corpus ID: 6047971
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition, and its inner primitive is a…
Expand
Highly Cited
2011
Highly Cited
2011
The p functions in K conversion Universal Turing Machine
2011
Corpus ID: 12621683
Cache coherence must work. In this position paper, we prove the construction of IPv7, which embodies the typical principles of…
Expand
2009
2009
Public key cryptography based privacy preserving multi-context RFID infrastructure
Selim Volkan Kaya
,
E. Savaş
,
A. Levi
,
Özgür Erçetin
Ad hoc networks
2009
Corpus ID: 30725337
Review
2008
Review
2008
Information Hiding Techniques: A Tutorial Review
Sabu M. Thampi
arXiv.org
2008
Corpus ID: 2766134
Abstract The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of…
Expand
Highly Cited
2007
Highly Cited
2007
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
Jiejun Kong
,
X. Hong
,
M. Gerla
IEEE Transactions on Mobile Computing
2007
Corpus ID: 9056987
Introducing node mobility into the network also introduces new anonymity threats. This important change of the concept of…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2003
Highly Cited
2003
Next generation security for wireless: elliptic curve cryptography
S. Vanstone
Computers & security
2003
Corpus ID: 206029473
Highly Cited
1998
Highly Cited
1998
A Timing Attack on RC5
H. Handschuh
,
H. Heys
ACM Symposium on Applied Computing
1998
Corpus ID: 1727399
This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is motivated by the possibility that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE