Abstract
This chapter covers the most important and useful cryptanalytic and cryptanalysis standards, validation methods, classification, and operations of cryptanalysis attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
Claude Elwood Shannon, https://www.itsoc.org/about/shannon
References
A. Atanasiu, Matematici in criptografie. Universul Stiintific, 2015. [Romanian Language]
A. Atanasiu, Securitatea Informatiei, vol. 1 (Criptografie), InfoData, 2007. [Romanian Language]
A. Atanasiu, Securitatea Informatiei, vol. 2 (Protocoale de securitate), InfoData, 2009. [Romanian Language]
S. J. Knapskog, “Formal specification and verification of secure communication protocols”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 58–73.
K. Koyama, “Direct demonstration of the power to break public-key cryptosystems”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 14–21.
P. J. Lee, “Secure user access control for public networks”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 45–57.
R. Lidl and W. B. Müller, “A note on strong Fibonacci pseudoprimes”, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 311–317. doi: 10.1007/BFb0030371.
A. J. Menezes and S. A. Vanstone, “Elliptic curve cryptosystems and their implementation”, J. Cryptology, vol. 6, no. 4, pp. 209–224, Sep. 1993, doi: 10.1007/BF00203817.
M. J. Mihaljevic and J. Dj. Golic, ‘A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence’, in Advances in Cryptology — AUSCRYPT ’90, J. Seberry and J. Pieprzyk, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1990, pp. 165–175.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Mihailescu, M.I., Nita, S.L. (2023). Cryptanalysis Attacks and Techniques. In: Pro Cryptography and Cryptanalysis with C++23. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9450-5_18
Download citation
DOI: https://doi.org/10.1007/978-1-4842-9450-5_18
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-9449-9
Online ISBN: 978-1-4842-9450-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)