-
1
Survey on approaches of stream cipher cryptanalysis
Published 2022-11-01Subjects: Get full text
Article -
2
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations
Published 2025-03-01Subjects: “…Differential cryptanalysis…”
Get full text
Article -
3
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
Published 2024-10-01Subjects: Get full text
Article -
4
An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
Published 2024-12-01Subjects: Get full text
Article -
5
Improved Quantum Linear Attacks and Application to CAST
Published 2025-06-01Subjects: “…Quantum cryptanalysis…”
Get full text
Article -
6
Image encryption using dna-sequences, chaotic dynamics and hash fuctions
Published 2019-06-01Subjects: Get full text
Article -
7
Zero correlation-integral attack of MIBS block cipher
Published 2016-11-01Subjects: Get full text
Article -
8
-
9
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: “…digital signature;hash function;cryptanalysis…”
Get full text
Article -
10
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Subjects: Get full text
Article -
11
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: Get full text
Article -
12
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01Subjects: “…cryptanalysis…”
Get full text
Article -
13
-
14
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01Subjects: Get full text
Article -
15
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
Published 2023-12-01Subjects: “…algebraic cryptanalysis…”
Get full text
Article -
16
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01Subjects: Get full text
Article -
17
-
18
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: Get full text
Article -
19
New Quantum Cryptanalysis of Binary Elliptic Curves
Published 2025-03-01Subjects: Get full text
Article -
20
Observations on TETRA Encryption Algorithm TEA-3
Published 2025-03-01Subjects: Get full text
Article