Ciphertext

Results: 697



#Item
601Chosen-plaintext attack / Ciphertext / Cryptanalysis / RSA / Four-square cipher / Two-square cipher / Cryptography / Data Encryption Standard / Tiny Encryption Algorithm

OWN33 Powers of t 0

Add to Reading List

Source URL: cs.jhu.edu

Language: English - Date: 2008-11-17 00:24:59
602Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-03-18 14:07:36
603Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

Add to Reading List

Source URL: www.math.huji.ac.il

Language: English - Date: 2010-09-02 14:16:20
604XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
605Block cipher / Data Encryption Standard / Key schedule / Weak key / Ciphertext / Cryptanalysis / Linear cryptanalysis / ICE / Cipher / Cryptography / Differential cryptanalysis / Advanced Encryption Standard

Narrow-Bicliques: Cryptanalysis of Full IDEA Dmitry Khovratovich1 , Ga¨etan Leurent2 , and Christian Rechberger3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2013-05-03 05:49:35
606Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
607Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
608ID-based encryption / Certificate-based encryption / Crypt / Ciphertext / ID-based cryptography / Proxy re-encryption / Cryptography / Public-key cryptography / Electronic commerce

Certificate-Based Encryption and the Certificate Revocation Problem

Add to Reading List

Source URL: www.cis.nctu.edu.tw

Language: English - Date: 2003-06-03 09:36:43
609Ciphertext / Disk encryption theory / Initialization vector / Galois/Counter Mode / Feistel cipher / Cipher / Ciphertext stealing / Advantage / Cryptography / Block cipher modes of operation / Block cipher

The Extended Codebook (XCB) Mode of Operation David A. McGrew and Scott Fluhrer Cisco Systems, Inc.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-10-25 16:41:00
610Key-agreement protocol / MQV / Public-key cryptography / XTR / Computational Diffie–Hellman assumption / Advantage / Perfect forward secrecy / Diffie–Hellman problem / Ciphertext indistinguishability / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
UPDATE