Ciphertext

Results: 697



#Item
111Feistel cipher / Ciphertext / Stream cipher / Cipher / Advantage / Keystream / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher modes of operation / Block cipher

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19
112Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
113Block cipher modes of operation / Block cipher / Ciphertext / RSA / PKCS / Triple DES / Tiny Encryption Algorithm / Cryptography / Public-key cryptography / Padding

Strengthened Encryption in the CBC Mode Vlastimil Klíma 1 and Tomáš Rosa 1,2 1 ICZ, V Olšinách 75, Prague 10, Czech Republic, http://www.i.cz Department of Computer Science and Engineering, Faculty of Electri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-28 08:36:04
114Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12
115Electronic commerce / Cryptographic protocols / Ciphertext / Key / Password / Malware / Man-in-the-middle attack / RSA / Key encapsulation / Cryptography / Public-key cryptography / Key management

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-04-03 00:22:05
116Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
117One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
118RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
119Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
120Mathematics / Knowledge / Mathematical proof / Science / Cryptography / Ciphertext indistinguishability / Optimal asymmetric encryption padding

Programming Language Techniques for Cryptographic Proofs

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
UPDATE