Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Data (E) > Data Encryption (E.3) > Code Breaking (E.3...)  
 
Options:
 
  1-7 of 7 Reviews about "Code Breaking (E.3...)": Date Reviewed
  Quantum cryptography: a survey
Bruss D., Erdélyi G., Meyer T., Riege T., Rothe J. ACM Computing Surveys 39(2): 6-es, 2007.  Type: Article

Despite its title, this survey develops only two applications of cryptographic protocols in quantum computing: key distribution and bit commitment protocol, both of which relate to the BB84 protocol proposed in 1984 by Bennett and Bras...

Aug 10 2007
  Index calculation attacks on RSA signature and encryption
Coron J., Naccache D., Desmedt Y., Odlyzko A., Stern J. Designs, Codes and Cryptography 38(1): 41-53, 2006.  Type: Article

This paper reports on a chosen ciphertext attack on the use of the RSA algorithm for digital signatures. It also describes a related attack on RSA-based privacy, but the main interest is in signatures. This attack is applied to a worki...

Jul 3 2006
  Cryptanalysis of Huang-Chang partially blind signature scheme
Zhang F., Chen X. Journal of Systems and Software 76(3): 323-325, 2005.  Type: Article

A partially blind signature is an extension of a blind signature that allows a signer to sign a partially blinded message that includes pre-agreed upon information, such as an expiration date, or collateral conditions on the resulting ...

Nov 9 2005
  Cryptanalysis: a study of ciphers and their solutions
Gaines H., Dover Publications, Incorporated, Mineola, NY, 2000. 237 pp.  Type: Book (9780486200972)

This book, which was first published in 1939, does not contain any recent ciphers. Aside from historic interest, readers will enjoy breaking quite complicated ciphers, on a level that requires no previous knowledge of cryptanalysis. In...

Dec 20 2004
  An information-theoretic model for steganography
Cachin C. Information and Computation 192(1): 41-56, 2004.  Type: Article

Most existing formal models for information hiding have not addressed steganography, but rather the more general problem of hiding information with active adversaries in watermarking and fingerprinting applications. This is different f...

Oct 5 2004
  Correlation properties of an improved summation generator with 2-bit memory
Chan C., Cheng L. Signal Processing 82(6): 907-909, 2002.  Type: Article

The authors present a counter argument to the claim of an earlier paper by Lee and Moon [1] that asserted an improved summation generator with 2-bit memory. After an introduction tracing the history of research on summation generators...

Feb 14 2003
  Strength of two data encryption standard implementations under timing attacks
Hevia A., Kiwi M. ACM Transactions on Information and System Security 2(4): 416-437, 1999.  Type: Article

The vulnerability of two implementations of the Data Encryption Standard (DES) to timing attacks--attacks that recover information by noting how long it takes to perform cryptographic operations--is clearly described....

Jul 1 2000
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy