Search results

Jump to navigation Jump to search

Page title matches

  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,916 words) - 05:49, 8 April 2024
  • 122 bytes (16 words) - 11:08, 24 October 2008
  • ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.
    1 KB (171 words) - 05:48, 8 April 2024
  • | article url = http://en.citizendium.org/wiki?title=Cryptanalysis&oldid=100694598
    573 bytes (49 words) - 17:57, 1 August 2010
  • {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • 194 bytes (26 words) - 02:00, 2 November 2008
  • 162 bytes (24 words) - 02:02, 2 November 2008
  • 189 bytes (22 words) - 00:07, 1 October 2009
  • ...n. Cryptology is the overall discipline encompassing both cryptography and cryptanalysis. Cryptanalysis is often undertaken by a malicious attacker, attempting to subvert a system
    32 KB (4,913 words) - 14:38, 18 March 2024

Page text matches

  • #REDIRECT [[Cryptanalysis]]
    27 bytes (2 words) - 01:30, 9 September 2013
  • #REDIRECT [[Integral cryptanalysis]]
    36 bytes (3 words) - 11:32, 9 August 2009
  • {{r|cryptanalysis}} {{r|linear cryptanalysis}}
    160 bytes (18 words) - 02:26, 31 March 2009
  • A Japanese [[cryptographer]] best known for discovering [[linear cryptanalysis]].
    95 bytes (10 words) - 23:16, 22 October 2010
  • {{r|Cryptanalysis}} These are subtopics only with respect to their cryptanalysis.
    287 bytes (37 words) - 18:47, 3 January 2009
  • A [[Japan|Japanese]] [[cryptographer]] best known for discovering [[linear cryptanalysis]]
    126 bytes (13 words) - 14:49, 22 May 2011
  • ...hrough all 2<sup>k</sup> possibilities. For k=1, this is just differential cryptanalysis, but with k>1 it is a new technique.
    1 KB (171 words) - 05:48, 8 April 2024
  • ...grapher, best known as co-author of the first public paper on differential cryptanalysis.
    139 bytes (17 words) - 22:01, 23 August 2010
  • The long history of the antithetical disciplines [[cryptography]] and [[cryptanalysis]].
    124 bytes (13 words) - 05:07, 19 October 2010
  • ===Cryptanalysis=== {{r|Cryptanalysis}}
    2 KB (194 words) - 14:48, 4 April 2024
  • {{r|Linear cryptanalysis}} {{r|Differential cryptanalysis}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • ...netic communications until 1939, but with some coverage of mail intercept, cryptanalysis, etc.
    220 bytes (26 words) - 19:09, 14 September 2009
  • ...st cryptologist in history, he pioneered the application of mathematics to cryptanalysis and built the U.S. Army Signal Intelligence Service technical base.
    211 bytes (28 words) - 17:53, 12 May 2008
  • ...ips. 2nd Edition is disappointing; it just appends a chapter on US-UK WWII cryptanalysis, rather than revising all relevant sections in the book. First chapter, "On * Friedman, William F. ''Military Cryptanalysis''
    1 KB (159 words) - 15:30, 27 May 2008
  • ...e of [[Nazi Germany]]. Unknown to the Germans, it had been substantially [[cryptanalysis|cryptanalyzed]] by the British [[Government Code and Cipher School]], with
    321 bytes (39 words) - 10:20, 14 June 2010
  • There has been no published cryptanalysis of the full E2, but there is an attack on a reduced-round version | title = Cryptanalysis of a Reduced Version of the Block Cipher E2
    941 bytes (134 words) - 05:48, 8 April 2024
  • ...ligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union.
    256 bytes (34 words) - 20:39, 4 September 2009
  • ...ting known text ([[ULTRA]] called this "gardening") &mdash; but the actual cryptanalysis is a passive attack. Two passive attacks &mdash; [[linear cryptanalysis]] and [[differential cryptanalysis]] &mdash; are very powerful. They are the only known attacks that break [[D
    3 KB (440 words) - 05:49, 8 April 2024
  • ...literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knu
    1 KB (192 words) - 05:48, 8 April 2024
  • ...g the cipher; they use [[Cryptanalysis#Practical_cryptanalysis | practical cryptanalysis]] techniques such as breaking into an office to steal keys. ...ar cryptanalysis]] and [[differential cryptanalysis]] in particular, and [[cryptanalysis]] in general. ''It also makes the payoff for breaking that key very large''
    3 KB (459 words) - 05:49, 8 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)