<--- Back to Details
First PageDocument Content
Substitution cipher / Cryptanalysis / Cipher / Transposition cipher / Caesar cipher / Symmetric-key algorithm / Known-plaintext attack / Index of cryptography articles / Multiple encryption / Cryptography / Ciphertext / Chosen-plaintext attack
Date: 2008-06-03 04:21:59
Substitution cipher
Cryptanalysis
Cipher
Transposition cipher
Caesar cipher
Symmetric-key algorithm
Known-plaintext attack
Index of cryptography articles
Multiple encryption
Cryptography
Ciphertext
Chosen-plaintext attack

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 580,95 KB

Share Document on Facebook

Similar Documents

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document