Sciweavers

427 search results - page 54 / 86
» Cryptanalysis of the
Sort
View
INFORMATICASI
2002
128views more  INFORMATICASI 2002»
14 years 11 months ago
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes
At PKC 2000, Inoue and Sakurai proposed some methods to design hash functions from block ciphers and codes (block codes and convolutional codes). They claimed that their hash func...
Hongjun Wu, Feng Bao, Robert H. Deng
53
Voted
COMCOM
1999
77views more  COMCOM 1999»
14 years 11 months ago
Cryptanalysis of a remote login authentication scheme
Min-Shiang Hwang
JEI
2002
152views more  JEI 2002»
14 years 11 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 11 months ago
Cryptanalysis of the RSA-CEGD protocol
Recently, Nenadi
Juan M. Estévez-Tapiador, Almudena Alcaide,...
CANS
2010
Springer
159views Cryptology» more  CANS 2010»
14 years 9 months ago
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Johannes Buchmann, Stanislav Bulygin, Jintai Ding,...