Sciweavers

427 search results - page 52 / 86
» Cryptanalysis of the
Sort
View
JOC
2008
92views more  JOC 2008»
14 years 11 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
JEI
2006
78views more  JEI 2006»
14 years 11 months ago
Cryptanalysis of an image encryption scheme
Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Ch...
JISE
2006
66views more  JISE 2006»
14 years 11 months ago
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem
Jaime Muñoz Masqué, Alberto Peinado
JSS
2006
65views more  JSS 2006»
14 years 11 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
IEEESP
2007
53views more  IEEESP 2007»
14 years 11 months ago
Micro-Architectural Cryptanalysis
Onur Acucmez, Jean-Pierre Seifert, Çetin Ka...