cryptanalysis
1. Side-channel attack is a new cryptanalysis,and the current cryptographic algorithms are vulnerable to higher-order side-channel attack.
1概述传统意义上的密码系统的安全性主要由算法复杂度决定。
2. Differential and Linear Cryptanalysis of AC Block Cipher
AC分组密码的差分和线性密码分析
3. One key problem in the cryptanalysis of GSM authentication algorithm COMP128 is identified and analyzed.
COMP128算法是GSM协议采用的认证算法。
4. DES consequently came under intense academic scrutiny, and motivated the modern understanding of block ciphers and their cryptanalysis.
DES因此遭到激烈学术审议,激励现代理解分组密码及密码翻译法。
5. Cryptanalysis of He-Wu signature scheme[J].Journal of Beijing University of Posts and Telecommunications,1999,22(4):6-8.
He-Wu数字签名方案的攻击方法[J].北京邮电大学学报,1999,22(4):6-8.
6. Linear Cryptanalysis of LOKI97
LOKI97的线性密码分析
7. Vulnerability cryptanalysis
n. 弱点密码分析
8. SAFER++ is selected for further evaluation in NESSIE second phase. A technique which connects differential cryptanalysis and nonlinear cryptanalysis is used to attack 4,5 and 6 rounds of SAFER++.
SAFER + +是进入NESSIE第 2轮评估的 7个分组算法之一 采用差分密码分析和非线性密码分析相结合的方法对 4轮、5轮和 6轮SAFER + +进行分析 ,结果表明 :6轮SAFER + +对这种攻击方法不免疫 ;
9. SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.
SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。
10. Cryptanalysis of the TAE Mode and Its Improvement
TAE模式的分析和改进
11. Cryptanalysis of the Vesta-2M stream cipher
Vesta-2M流密码的密码分析
12. XSL algorithm is introduced for the cryptanalysis of block ciphers by Nicolas Courtois and Josef Pieprzyk, derived from XL.
XSL算法是Courtois和Pieprzyk在分析分组密码时,在XL算法的基础上提出的一种新的算法。
13. Cryptanalysis and Improvement of a Signcryption Scheme with Public Verifiability
一个可公开验证签密方案的密码分析和改进
14. Cryptanalysis of a Remote Password Authentication Scheme
一个远程口令鉴别方案的分析
15. Cryptanalysis of Some Provably Secure Signature Schemes
一些可证安全签名方案的密码学分析
16. The Cryptanalysis of a Quantum Key Distribution and Authentication Protocol Through Once Quantum Communication
一次量子通信量子密钥分发和认证协议的安全性分析
17. Cryptanalysis of a proxy multisignature scheme
一种代理多重数字签名方案的安全性分析
18. Cryptanalysis and improvement of a WTLS handshake protocol with user anonymity and forward secrecy
一种具有用户匿名性和前向安全性的WTLS握手协议的安全性分析及其改进
19. Cryptanalysis of a Dynamic Threshold Group Signature Scheme
一种动态门限群签名方案的安全性分析
20. Cryptanalysis of multiple chaotic systems based public key encryption technique
一种多混沌系统公钥密码算法的安全性分析
21. Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme from Bilinear Pairings
一种门限代理签名方案的分析与改进
22. CRYPTANALYSIS OF A CLASS OF CHAOTIC STREAM CIPHERS
一类混沌流密码的分析
23. Cryptanalysis and improvement of a threshold proxy signcryption scheme
一类门限代理签密方案的分析与改进
24. impossible differential cryptanalysis
不可能差分分析
25. Cryptanalysis and improvement of two threshold signature schemes
两种门限签名方案的密码学分析及其改进
26. Intermediate Cryptanalysis Course
中级密码分析课程
27. This paper presents a ciphertext-only cryptanalysis of A 5/2 ciphering algorithm in GSM encrypted communication.
主要介绍一种针对GSM系统中的加密算法A5/2算法的实时唯密文攻击算法。
28. They are weak in resisting cryptanalysis because of the lack of nonlinear transformation in systems.
从密码分析的角度看,由于不具有非线性变换,密码的混淆能力不强,容易被攻击。
29. algebraic cryptanalysis
代数分析
30. Keywords Information security;information hiding;cryptography;cryptanalysis;chaos;chaotic cipher;block cipher;watermarking;
信息安全;信息隐藏;密码学;密码分析;混沌;混沌密码;分组密码;数字水印;
31. public-key cryptanalysis
公开密钥体系
32. Cryptanalysis of data encryption scheme based on arithmetic coding
关于一种算术编码数据加密方案的密码分析
33. partition linear cryptanalysis
分区线性分析法
34. Partition linear cryptanalysis for block cipher
分组密码的分区线性分析法
35. The field that encompasses both cryptography and cryptanalysis.
包含加密技术和密码分析(学)两部分的学科领域。
36. In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.
在数学,物理和信号处理中频率分析是一种分解函数,波形,或信号的频率组成以获取频谱的方法。
37. Cryptanalysis of one-off blind public key based on ID
基于ID的一次性盲公钥的密码学分析
38. Cryptanalysis of the remote login authentication scheme based on the geometric approach
基于几何方法的远程登录认证方案的密码分析
39. Cryptanalysis of Key Agreement Scheme Based on Generalised Inverses of Matrices
基于矩阵广义逆的密钥协同方案的分析
40. Cryptanalysis on generalization of threshold signature and authenticated encryption for group communications
基于群组通信的通用阈值签名和鉴别加密技术分析
41. Cryptanalysis of an Identity-Based Verifiably Encrypted Signature Scheme
基于身份的可验证加密签名协议的安全性分析
42. Differential cryptanalysis of multiple round characteristics
多图特征的差分密码分析
43. multiple linear cryptanalysis
多重线性密码分析
44. Construction of linear approximation equations in multiple linear cryptanalysis
多重线性密码分析中线性逼近方程的构造
45. In cryptanalysis, a pair of consecutive letters.
密码分析中一对连缀的字母对。
46. In cryptanalysis, a pair of consecutive letters. In statistical attacks on ciphers the known frequency of various bigrams, in a given language, can be used in attempts to break the cipher.
密码分析中一对连缀的字母对。在对密码的统计攻击中,可用已知语言的各双字母组的频度来攻破密码。
47. In cryptanalysis, a triple of successive letters
密码分析中的一组三个连续字母。
48. cryptanalysis attack
密码分析攻击
49. Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies.
密码加密算法的对立面就是密码分析,也就是破译技术研究。加密与破译是一对矛盾,了解破译对研究加密非常必要。
50. The study of cryptanalysis or cryptography.
密码学研究密码分析或密码学的学科
51. password cryptanalysis of Hash functions
密码杂凑函数
52. Keywords cipher algorithm;cryptography;wireless network;cryptanalysis;authentication mode;one-way hash function;security;pseudo-randomness;statistical evaluation;whiteness test;
密码算法;密码编码;无线网络;密码分析;认证模式;单向散列函数;安全性;伪随机性;统计评估;白化测试;
53. Cryptanalysis of a Variant of a Cellular Automata Based Cryptosystem
对一个基于细胞自动机的分组密码变形的分析
54. Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme
对一种门限代理签名方案的密码分析及改进
55. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes
对两个可转变认证加密方案的分析和改进
56. A differential cryptanalysis of the iterated block cipher based on the new round function is presented.
对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。
57. Cryptanalysis of Proxy Multi-signature, Multi-proxy Signature and Multi-proxy Multi-signature Schemes from Bilinear Pairings
对来自双线性配对的三种代理签名体制的密码学分析
58. STUDY ON THE COMPUTATION OF DIFFERENTIAL CHARACTERISTIC PROBABILITY IN DIFFERENTIAL CRYPTANALYSIS
差分分析中的特征概率计算问题研究
59. The Applications of Differential Cryptanalysis in Sequence Cipher Attack
差分分析在序列密码攻击中的应用
60. differential cryptanalysis
差分密码分析
61. The Application of SPRT in Cryptanalysis
序贯概率比检验在密码分析中的应用
62. circulating relations of linear cryptanalysis
循环逼近式系统
63. An important problem in the design of the block cipher is to improve the performance of the resisting differential cryptanalysis.
指出了使用大规模的基于全奇异矩阵的代替置换网络可有效地提高分组密码抗差分密码分析的安全性。
64. Through the cryptanalysis of a threshold proxy signature scheme based on bilinear pairings, it was found that the scheme couldn't resist forgery attack and public-key substitute attack.
摘要对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
65. Through the cryptanalysis of an ID-based threshold signcryption scheme from bilinear pairings, it is found that the scheme can not resist forgery attack.
摘要对一种基于身份的门限签密方案进行了密码分析,发现该方案不能抵抗伪造攻击。
66. In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide and attack sample.
摘要给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
67. Cryptanalysis of the Data Information Disordering Algorithm
数据置乱算法的分析
68. Digital Forensic Tools: Imaging, Cryptanalysis, Steganalysis, Data Recovery.
数码法医工具:成像,密码分析,信息隐藏检测,数据恢复。
69. "Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology."
整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。
70. Side - channel cryptanalysis
旁路分析(侧信道分析)
71. Cryptanalysis of Aydos'mutual authentication and key establish ment protocol for wireless communication
无线通信相互认证和密钥建立协议的安全性分析
72. In this paper, the Sequential Probability Ratio Test (SPRT) is introduced to cryptanalysis to reduce the amount of keys needed in correlation attacks.
本文把序贯概率比检验引入到密码分析中,用来约减相关攻击所需的密钥量。
73. Keywords Chaos;Information Security;Cryptography;Cryptanalysis;Chaotic stream Cipher;
混沌;信息安全;密码学;密码分析;混沌序列密码;
74. Keywords Chaos;Cryptography;Information Security;Chaotic Cipher;Cryptanalysis;matrix transformation;
混沌;信息安全;密码学;混沌密码;密码分析;矩阵映射;
75. Keywords Chaos;Cryptography;Information Security;Block Cipher;Chaotic Cipher;Cryptanalysis;Digital Watermark;
混沌;密码学;信息安全;分组密码;混沌密码;密码分析;数字水印;
76. Second, the leap forward in unsupervised learning fits in with his work on cryptanalysis;
第二,在无监督式学习方面的跃进和图灵的密码方面工作符合;
77. security cryptanalysis
算法安全性分析
78. The strong security to all known cryptanalysis ensures the encryption of both letter information and non-letter chinese character information.
算法有较高的安全性,能够抵抗现有的密码分析方法,它既适合字母文字信息的加密,也适合非字母的中文信息对称加密。
79. The designers claim that 5-round SAFER++ is secure against differential cryptanalysis.
算法的设计者称5轮SAFER++算法可以抵抗差分分析。
80. Linear cryptanalysis
线性密码分析