Sciweavers

123 search results - page 14 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
CORR
2010
Springer
75views Education» more  CORR 2010»
15 years 16 days ago
An Optimal Family of Exponentially Accurate One-Bit Sigma-Delta Quantization Schemes
Sigma-Delta modulation is a popular method for analog-to-digital conversion of bandlimited signals that employs coarse quantization coupled with oversampling. The standard mathema...
Percy Deift, C. Sinan Güntürk, Felix Kra...
86
Voted
IJBC
2006
80views more  IJBC 2006»
15 years 13 days ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Shujun Li, Guanrong Chen, Gonzalo Álvarez
122
Voted
COMPSEC
2004
99views more  COMPSEC 2004»
15 years 9 days ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
ICISC
2007
125views Cryptology» more  ICISC 2007»
15 years 1 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
IAJIT
2008
179views more  IAJIT 2008»
15 years 15 days ago
Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers
: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption sc...
Ragheb Toemeh, Subbanagounder Arumugam