Ciphertext

Results: 697



#Item
581Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
582Data Encryption Standard / Symmetric-key algorithm / Cryptography / Ciphertext / Cipher

2008 Paper 3 Question 8 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:47
583Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
584Substitution cipher / Cryptanalysis / Cipher / Transposition cipher / Caesar cipher / Symmetric-key algorithm / Known-plaintext attack / Index of cryptography articles / Multiple encryption / Cryptography / Ciphertext / Chosen-plaintext attack

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:21:59
585Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:03
586Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
587Block ciphers / CPU cache / Side channel attack / Ciphertext / Lookup table / ICE / UES / Tiny Encryption Algorithm / VEST / Cryptography / Data Encryption Standard / Advanced Encryption Standard

J. Cryptol. DOI: [removed]s00145[removed]y Efficient Cache Attacks on AES, and Countermeasures Eran Tromer Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-07-26 00:46:34
588RSA / Stream cipher / Ciphertext stealing / Format-preserving encryption / Cryptography / Cipher / Block cipher

CS255: Cryptography and Computer Security Winter 2011

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2011-01-21 19:12:13
589Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-04-21 13:20:55
590Ciphertext / Pseudorandom number generator / Cipher / RC6 / One-time pad / Block cipher modes of operation / Cryptography / Initialization vector / Advanced Encryption Standard

Randomness Testing of the Advanced Encryption Standard Finalist Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
UPDATE