Chosen-plaintext attack

Results: 179



#Item
71Block cipher / Chosen-plaintext attack / Plaintext / Known-plaintext attack / Crypt / Ciphertext / Cipher / ICE / Data Encryption Standard / Cryptography / Format-preserving encryption / Advanced Encryption Standard

Analysis of VAES3 (FF2) Morris Dworkin Ray Perlner National Institute of Standards and Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 13:14:10
72MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
73Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
74KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
75Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
76Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
77Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
78Password / Ciphertext indistinguishability / Dropbox / Comodo Group / Unified Extensible Firmware Interface / Crypt / Chosen-plaintext attack / Man-in-the-middle attack / Plaintext / Software / Computing / Cryptography

Security Now! #Q&A #208  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-17 16:05:33
79Cipher / Block cipher / Chosen-plaintext attack / Advantage / Symmetric-key algorithm / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

CS255: Cryptography and Computer Security Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-19 23:38:58
80Authenticated encryption / Chosen-plaintext attack / Block cipher modes of operation / Advantage / Chosen-ciphertext attack / Ciphertext / Block cipher / Data Encryption Standard / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006 Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-17 21:22:01
UPDATE