Search

Your search keyword '"Chosen-plaintext attack"' showing total 474 results

Search Constraints

Start Over You searched for: Descriptor "Chosen-plaintext attack" Remove constraint Descriptor: "Chosen-plaintext attack"
474 results on '"Chosen-plaintext attack"'

Search Results

451. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain

453. Guesswork and Variation Distance as Measures of Cipher Security

454. Reducing the Collision Probability of Alleged Comp128

455. Cryptanalysis of Some AES Candidate Algorithms

456. How to Securely Broadcast a Secret

458. A Key-schedule Weakness in SAFER K-64

459. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry

460. Cryptanalysis of optical encryption schemes based on joint transform correlator architecture

461. Cryptanalysis of LOKI 91

462. A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems

463. An improved block cryptosystem based on iterating chaotic map

464. Chosen plaintext attack on double random-phase encoding in the Fresnel domain

465. Security of private-key encryption based on array codes

466. Private-key encryption based on concatenation of codes

467. A chosen-plaintext attack on the microsoft BASIC protection

468. A cryptanalytic time-memory trade-off

469. An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems

470. A wrap error attack against NTRUEncrypt

471. On the security of multiple encryption

472. The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack

473. Image encryption scheme for secure digital images based on 3D cat map and Turing machine

474. On the Design of Error-Correcting Ciphers

Catalog

Books, media, physical & digital resources