Ciphertext

Results: 697



#Item
591Cipher / Man-in-the-middle attack / Transport Layer Security / Cryptography / Ciphertext / Public-key cryptography

Appeal: [removed]Doc: 66

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-04-17 18:04:06
592Ciphertext / Cipher / Avalanche effect / Random number generation / Block cipher modes of operation / One-time pad / Cryptography / Initialization vector / Pseudorandom number generator

Randomness Testing of the Advanced Encryption Standard Candidate Algorithms Affiliation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
593Block cipher / Ciphertext stealing / Data Encryption Standard / Cipher / Symmetric-key algorithm / Block size / IEEE P1619 / Intel Cascade Cipher / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

LNCS[removed]Memory Encryption for Smart Cards

Add to Reading List

Source URL: emsec.rub.de

Language: English - Date: 2012-01-16 04:35:17
594Cyberwarfare / Boneh/Franklin scheme / XTR / Advantage / Polynomial / Security / Applied mathematics / Cryptography / Ciphertext indistinguishability / ID-based encryption

Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme Liqun Chen1 and Zhaohui Cheng2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-31 15:06:27
595Differential cryptanalysis / Slide attack / DES-X / Chosen-plaintext attack / Cryptanalysis / RSA / Ciphertext / Tiny Encryption Algorithm / Cryptography / Data Encryption Standard / Public-key cryptography

Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman1,2 , Nathan Keller2 , and Adi Shamir2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-10-02 05:38:38
596Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
597Key management / Authorization certificate / ID-based encryption / Public key certificate / X.509 / Attribute grammar / RSA / Certificate authority / Ciphertext / Cryptography / Public-key cryptography / Electronic commerce

Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Add to Reading List

Source URL: www.emc.com

Language: English
598Commitment scheme / Randomized algorithm / One-way function / PP / IP / RSA / Ciphertext indistinguishability / Negligible function / Computational complexity theory / Theoretical computer science / Cryptography / Applied mathematics

Commitment Schemes and Zero-Knowledge Protocols[removed]Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2008-02-13 04:47:39
599Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
600Paillier cryptosystem / ElGamal encryption / Homomorphic encryption / Threshold cryptosystem / Goldwasser–Micali cryptosystem / Chosen-ciphertext attack / RSA / Semantic security / Key / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Financial Cryptography, 4th International Conference[removed]104"

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2011-02-11 09:14:00
UPDATE