<--- Back to Details
First PageDocument Content
Cryptography / Computational complexity theory / Knapsack problem / Cipher / Public-key cryptography / Encryption / Symmetric-key algorithm / Key / P versus NP problem / MerkleHellman knapsack cryptosystem / RSA
Date: 2014-11-28 11:05:21
Cryptography
Computational complexity theory
Knapsack problem
Cipher
Public-key cryptography
Encryption
Symmetric-key algorithm
Key
P versus NP problem
MerkleHellman knapsack cryptosystem
RSA

Public Key Cryptography Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Download Document from Source Website

File Size: 324,05 KB

Share Document on Facebook

Similar Documents

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

DocID: 1xVRk - View Document

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

DocID: 1xVtQ - View Document

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

DocID: 1xToj - View Document

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document

LNCSCryptanalysis of the “Kindle” Cipher

LNCSCryptanalysis of the “Kindle” Cipher

DocID: 1uyia - View Document