| Keyword : cryptanalysis
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications Hu XIONG Xiaofeng WANG Fagen LI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A
No. 1 ;
pp. 256-258
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: wireless communication, user authentication, anonymity, cryptanalysis, | | Summary | Full Text:PDF(63.3KB) | |
| |
|
Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices Mohamed RASSLAN Amr YOUSSEF | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A
No. 2 ;
pp. 853-854
Type of Manuscript:
LETTER
Category: Cryptography and Information Security Keyword: public key cryptosystems, cryptanalysis, | | Summary | Full Text:PDF(60.7KB) | |
| |
| |
| |
|
An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Eun-Jun YOON Kee-Young YOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A
No. 4 ;
pp. 850-853
Type of Manuscript:
LETTER
Category: Reliability, Maintainability and Safety Analysis Keyword: cryptography, authentication, password, key exchange, cryptanalysis, | | Summary | Full Text:PDF(299.6KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems Yuh-Min TSENG | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B
No. 5 ;
pp. 1679-1681
Type of Manuscript:
LETTER
Category: Fundamental Theories Keyword: cryptography, cryptanalysis, signature, computer viruses, | | Summary | Full Text:PDF(116.1KB) | |
| |
|
On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis Fumihiko SANO Kenji OHKUMA Hideo SHIMIZU Shinichi KAWAMURA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1 ;
pp. 37-46
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions Keyword: block cipher, SPN, cryptanalysis, | | Summary | Full Text:PDF(807.4KB) | |
|
Linear Cryptanalysis of Block Cipher Xenon Toshio TOKITA Mitsuru MATSUI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1 ;
pp. 13-18
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions Keyword: block cipher, cryptanalysis, linear cryptanalysis, ISO, Xenon, | | Summary | Full Text:PDF(254.9KB) | |
|
Cryptanalysis of Reduced-Round RC6 without Whitening Atsuko MIYAJI Masao NONAKA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1 ;
pp. 19-30
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions Keyword: block cipher, RC6, cryptanalysis, χ2 attack, | | Summary | Full Text:PDF(685.3KB) | |
|
Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network Narn-Yih LEE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D
No. 2 ;
pp. 386-391
Type of Manuscript:
PAPER
Category: Applications of Information Security Techniques Keyword: cryptography, cryptanalysis, access control, user authentication, | | Summary | Full Text:PDF(204.5KB) | |
| |
| |
| |
| |
| |
| |
| |
|
On the Number of Messages Which Cannot be Concealed in LUC Wen-Chung KUO Chi-Sung LAIH Min Jea GAU Chin Chen CHANG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A
No. 11 ;
pp. 2218-2224
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security Keyword: LUC, RSA, cryptosystems, cryptanalysis, | | Summary | Full Text:PDF(562.3KB) | |
| |
| |
|
Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck Koji KUSUDA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A
No. 1 ;
pp. 35-48
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: block cipher, cryptanalysis, time-memory trade-off, | | Summary | Full Text:PDF(986.1KB) | |
| |
|
How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis Kenji KOYAMA Routo TERADA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A
No. 1 ;
pp. 63-69
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: DES, cryptanalysis, differential attack, probabilistic swapping, | | Summary | Full Text:PDF(562.8KB) | |
|
|