Sciweavers

123 search results - page 14 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
CORR
2010
Springer
75views Education» more  CORR 2010»
15 years 3 months ago
An Optimal Family of Exponentially Accurate One-Bit Sigma-Delta Quantization Schemes
Sigma-Delta modulation is a popular method for analog-to-digital conversion of bandlimited signals that employs coarse quantization coupled with oversampling. The standard mathema...
Percy Deift, C. Sinan Güntürk, Felix Kra...
IJBC
2006
80views more  IJBC 2006»
15 years 3 months ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Shujun Li, Guanrong Chen, Gonzalo Álvarez
COMPSEC
2004
99views more  COMPSEC 2004»
15 years 3 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
ICISC
2007
125views Cryptology» more  ICISC 2007»
15 years 4 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
IAJIT
2008
179views more  IAJIT 2008»
15 years 3 months ago
Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers
: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption sc...
Ragheb Toemeh, Subbanagounder Arumugam