CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - Cryptanalysis

搜索资源列表

  1. CryptanalysisofHwang-ChangsaTime-StampProtocolforD

    0下载:
  2. Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:386.57kb
    • 提供者:xiaowang
  1. CryptanalysisofaNewChaoticCryptosystemBasedonErgod

    0下载:
  2. Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:173.17kb
    • 提供者:xiaowang
  1. Cryptanalysisofanimageencryptionscheme

    0下载:
  2. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
  3. 所属分类:Document

    • 发布日期:2017-04-04
    • 文件大小:245.79kb
    • 提供者:xiaowang
  1. Introduction_to_cryptology_Part1_Basic_cryptology

    0下载:
  2. Introduction to Cryptograpy and Cryptanalysis
  3. 所属分类:software engineering

    • 发布日期:2017-03-26
    • 文件大小:129.17kb
    • 提供者:marara
  1. pradono-report

    0下载:
  2. Dalam tulisan ini akan dibahas mengenai pelanggaran keamanan dengan menggunakan metode Keyboard Acoustic Emanations of Acoustic Cryptanalysis. Akan dibahas mengenai cara penggunaan metoda tersebut dan cara mengantisipasinya. Serta akan diberikan cont
  3. 所属分类:File Formats

    • 发布日期:2017-04-02
    • 文件大小:286.88kb
    • 提供者:ayu mika
  1. cryptography_latest.tar

    0下载:
  2. Historically developed to ensure secrecy in the mail, encryption of information today is used more broadly to prohibit access to or modification of sensitive data and ensure confidentiality in computer applications, so cryptology is the scien
  3. 所属分类:Project Design

    • 发布日期:2017-04-09
    • 文件大小:168.79kb
    • 提供者:doniya
  1. cryptanalysis

    0下载:
  2. 一种可破解permutation-only图像加密算法的通用方法,使用cat,baker等置乱方法加密的图像可成功被破解。-One kind of permutation-only image can crack the encryption algorithm common method using cat, baker and other image scrambling encryption method can be successfully cracked.
  3. 所属分类:Development Research

    • 发布日期:2017-04-05
    • 文件大小:560.36kb
    • 提供者:lurenjia
  1. PAPER5

    0下载:
  2. 基于最优区分器的多差分密码分析方法.pdf-Multi differential cryptanalysis method to distinguish the best
  3. 所属分类:Communication

    • 发布日期:2017-04-26
    • 文件大小:372.68kb
    • 提供者:xiaozhang
  1. 10_Victor

    0下载:
  2. Fault-based Cryptanalysis on Block Ciphers
  3. 所属分类:Development Research

    • 发布日期:2017-05-26
    • 文件大小:8.49mb
    • 提供者:reza
搜珍网 www.dssz.com