|
Browse All Reviews > Data (E) > Data Encryption (E.3) > Code Breaking (E.3...)
|
|
|
|
|
|
|
|
|
1-7 of 7
Reviews about "Code Breaking (E.3...)":
|
Date Reviewed |
|
Quantum cryptography: a survey Bruss D., Erdélyi G., Meyer T., Riege T., Rothe J. ACM Computing Surveys 39(2): 6-es, 2007. Type: Article
Despite its title, this survey develops only two applications of cryptographic protocols in quantum computing: key distribution and bit commitment protocol, both of which relate to the BB84 protocol proposed in 1984 by Bennett and Bras...
|
Aug 10 2007 |
|
Index calculation attacks on RSA signature and encryption Coron J., Naccache D., Desmedt Y., Odlyzko A., Stern J. Designs, Codes and Cryptography 38(1): 41-53, 2006. Type: Article
This paper reports on a chosen ciphertext attack on the use of the RSA algorithm for digital signatures. It also describes a related attack on RSA-based privacy, but the main interest is in signatures. This attack is applied to a worki...
|
Jul 3 2006 |
|
Cryptanalysis of Huang-Chang partially blind signature scheme Zhang F., Chen X. Journal of Systems and Software 76(3): 323-325, 2005. Type: Article
A partially blind signature is an extension of a blind signature that allows a signer to sign a partially blinded message that includes pre-agreed upon information, such as an expiration date, or collateral conditions on the resulting ...
|
Nov 9 2005 |
|
Cryptanalysis: a study of ciphers and their solutions Gaines H., Dover Publications, Incorporated, Mineola, NY, 2000. 237 pp. Type: Book (9780486200972)
This book, which was first published in 1939, does not contain any recent ciphers. Aside from historic interest, readers will enjoy breaking quite complicated ciphers, on a level that requires no previous knowledge of cryptanalysis. In...
|
Dec 20 2004 |
|
An information-theoretic model for steganography Cachin C. Information and Computation 192(1): 41-56, 2004. Type: Article
Most existing formal models for information hiding have not addressed steganography, but rather the more general problem of hiding information with active adversaries in watermarking and fingerprinting applications. This is different f...
|
Oct 5 2004 |
|
Correlation properties of an improved summation generator with 2-bit memory Chan C., Cheng L. Signal Processing 82(6): 907-909, 2002. Type: Article
The authors present a counter argument to the claim of an earlier paper by Lee and Moon [1] that asserted an improved summation generator with 2-bit memory. After an introduction tracing the history of research on summation generators...
|
Feb 14 2003 |
|
Strength of two data encryption standard implementations under timing attacks Hevia A., Kiwi M. ACM Transactions on Information and System Security 2(4): 416-437, 1999. Type: Article
The vulnerability of two implementations of the Data Encryption Standard (DES) to timing attacks--attacks that recover information by noting how long it takes to perform cryptographic operations--is clearly described....
|
Jul 1 2000 |
|
|
|
|
|
|