搜索资源列表
IDEA
- IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-at
dcades
- des差分密码分析实现源代码-des differential cryptanalysis achieve source code
差分分析(C++)
- 差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
s_des
- DES是种抗密码分析更强的加密方法,尽管DES的安全强度一直是个争论的话题.现今在金融行业已十分流行. java实现的简单DES加密算法-DES is a stronger anti-cryptanalysis of encryption methods, despite the strength of DES security has always been a controversial topic. Present in the financial industry has been
cryptbasInC
- Cryptanalysis Source Code in C
OpenSCA
- OpenSCA - An open source toolbox for Matlab side channel cryptanalysis -OpenSCA- An open source toolbox for Matlab side channel cryptanalysis
CryptanalysisofHwang-ChangsaTime-StampProtocolforD
- Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
CryptanalysisofaNewChaoticCryptosystemBasedonErgod
- Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
Introduction_to_cryptology_Part1_Basic_cryptology
- Introduction to Cryptograpy and Cryptanalysis
Introduction_to_cryptology_Part_3_Cryptographic_p
- Introduction to Cryptograpy and Cryptanalysis-part3
Introduction_to_cryptology_Part_2_Symmetric_and_a
- Introduction to Cryptograpy and Cryptanalysis pART2
Practical Attack on KeeLoq
- Practical Attack on KeeLoq. KeeLoq, cryptanalysis, block ciphers, slide attacks, meetin- the-middle attacks.
Cryptoanalysis of the KeeLoq block cipher
- KeeLoq block cipher, cryptanalysis, slide attacks, guessand- determine attacks, distinguishing attacks
waes
- cryptanalysis of an aes white box
2CryptanalysisofVideoEncryption
- Content security is an important issue in multimedia applications. In this paper we perform a cryptanalysis of several encryption algorithms that have been proposed to protect the privacy of MPEG video streams. In particular, we analyze the enc
crosscorelation
- In signal processing, cross-correlation is a measure of similarity of two waveforms as a function of a time-lag applied to one of them. This is also known as a sliding dot product or inner-product. It is commonly used to search a long duration signal
DESdifferential-analysis-
- C语言实现——应用分组密码体制的基本原理,实现DES加解密,并分析 DES 的雪崩性质,对DES加密进行差分分析,并利用自己设计的S盒进行加密 -C language- Application of basic principles of block ciphers, DES encryption and decryption to achieve, and the nature of the avalanche DES, differential cryptanalysis of DES en
Cryptanalysis-INCrypt32-of-iCLASS
- Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message at
Cryptanalysis-of-Multi-Prime-RSA
- Cryptanalysis of Multi-Prime RSA