EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptanalysis"
Narrow search

Narrow search

Year of publication
Subject
All
Cryptanalysis 7 Authentication 2 Data security 2 Datensicherheit 2 Affine Equivalence 1 Algebraic Degree 1 Algorithm 1 BAN Logic 1 Bit Sum Attack 1 Cellular Automata 1 Chaos 1 Chaotic Logistic Map 1 Chaotic encryption 1 Chaotic map 1 Cloud Computing 1 Cloud computing 1 Coincidence Count 1 Computer network 1 Computernetz 1 Computersicherheit 1 Cryptography 1 Data protection 1 Datenschutz 1 Datensicherung 1 Encryption 1 Image Watermarking 1 Image encryption 1 Information management 1 Informationsmanagement 1 Kryptoanalyse 1 Multi-Server Environment 1 Netzwerkverwaltung 1 Neural Networks 1 Patterns 1 Pervasive and embedded computing 1 RFID 1 RSA 1 Rechnernetz 1 Regression 1 S-Boxes 1
more ... less ...
Online availability
All
Undetermined 6 Free 1
Type of publication
All
Article 8 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1 Lehrbuch 1 Textbook 1
Language
All
English 7 German 1 Undetermined 1
Author
All
Ahmad, Musheer 1 AlSharari, Hamed D. 1 Alam, Naved 1 Bhasin, Harsh 1 Chandrakar, Preeti 1 Dung, Luong The 1 Kaushal, Puneet Kumar 1 Lian, Shiguo 1 Om, Hari 1 Phan, Raphael C.-W. 1 Sobti, Rajeev 1 Studer, Bruno 1 Sun, Jinsheng 1 Thangavel, M. 1 Tho, Hoang Duc 1 Varalakshmi, P. 1 Wang, Zhiquan 1
more ... less ...
Published in...
All
Informatik 1 International Journal of Applied Metaheuristic Computing (IJAMC) 1 International Journal of Business Data Communications and Networking (IJBDCN) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Knowledge and Systems Science (IJKSS) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International journal of information systems and change management : IJISCM 1 Physica A: Statistical Mechanics and its Applications 1 vdf Praxis und Lehre / Informatik 1
more ... less ...
Source
All
Other ZBW resources 5 ECONIS (ZBW) 2 BASE 1 RePEc 1
Showing 1 - 9 of 9
Cover Image
Breaching Security of Full Round Tiny Encryption Algorithm
Sobti, Rajeev; Kaushal, Puneet Kumar - In: International Journal of Information Security and … 12 (2018) 1, pp. 89-98
Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of reducing the hardware cost. In this paper, we introduced coincidence count attack at bit level, a kind of known-plaintext attack and evaluated...
Persistent link: https://www.econbiz.de/10012045711
Saved in:
Cover Image
Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map
Ahmad, Musheer; AlSharari, Hamed D. - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 4, pp. 61-73
article, the shortcomings of the proposed watermarking scheme and cryptanalysis are presented to demonstrate that the scheme … analysis of the proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of the anticipated …
Persistent link: https://www.econbiz.de/10012047421
Saved in:
Cover Image
Applicability of Cellular Automata in Cryptanalysis
Bhasin, Harsh; Alam, Naved - In: International Journal of Applied Metaheuristic … 8 (2017) 2, pp. 38-48
Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct … Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a … contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in …
Persistent link: https://www.econbiz.de/10012042945
Saved in:
Cover Image
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment
Chandrakar, Preeti; Om, Hari - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 85-101
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured that it is withstands to various kinds of security attacks. But, the authors review carefully Om et al.'s scheme and discover that it unable to resist three attacks (like password...
Persistent link: https://www.econbiz.de/10012043273
Saved in:
Cover Image
An Algorithm for Improving Algebraic Degree of S-Box Based on Affine Equivalence Transformation
Dung, Luong The; Tho, Hoang Duc - In: International Journal of Knowledge and Systems Science … 8 (2017) 1, pp. 53-64
cryptanalysis, for instance higher-order differential attacks, algebraic attacks or cube attacks. In this paper the authors propose …
Persistent link: https://www.econbiz.de/10012046349
Saved in:
Cover Image
Improved secure RSA crytosystem for data confidentiality in cloud
Thangavel, M.; Varalakshmi, P. - In: International journal of information systems and change … 9 (2017) 4, pp. 261-277
Persistent link: https://www.econbiz.de/10011858355
Saved in:
Cover Image
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
Phan, Raphael C.-W. - 2009
Since RFID tags are ubiquitous and at times even oblivious to thehuman user, all modern RFID protocols are designed to resist tracking so that thelocation privacy of the human RFID user is not violated. Another design criterionfor RFIDs is the low computational effort required for tags, in view...
Persistent link: https://www.econbiz.de/10009461313
Saved in:
Cover Image
Netzwerkmanagement und Netzwerksicherheit : ein Kompaktkurs für Praxis und Lehre
Studer, Bruno - 2010
Persistent link: https://www.econbiz.de/10008780142
Saved in:
Cover Image
Security analysis of a chaos-based image encryption algorithm
Lian, Shiguo; Sun, Jinsheng; Wang, Zhiquan - In: Physica A: Statistical Mechanics and its Applications 351 (2005) 2, pp. 645-661
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to...
Persistent link: https://www.econbiz.de/10010589989
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...