Sciweavers

123 search results - page 14 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
CORR
2010
Springer
75views Education» more  CORR 2010»
14 years 9 months ago
An Optimal Family of Exponentially Accurate One-Bit Sigma-Delta Quantization Schemes
Sigma-Delta modulation is a popular method for analog-to-digital conversion of bandlimited signals that employs coarse quantization coupled with oversampling. The standard mathema...
Percy Deift, C. Sinan Güntürk, Felix Kra...
IJBC
2006
80views more  IJBC 2006»
14 years 9 months ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Shujun Li, Guanrong Chen, Gonzalo Álvarez
COMPSEC
2004
99views more  COMPSEC 2004»
14 years 9 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
ICISC
2007
125views Cryptology» more  ICISC 2007»
14 years 11 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
69
Voted
IAJIT
2008
179views more  IAJIT 2008»
14 years 9 months ago
Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers
: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption sc...
Ragheb Toemeh, Subbanagounder Arumugam