One-time pad

Results: 106



#Item
51Block cipher / Ciphertext / One-time pad / Cyberwarfare / Applied mathematics / Secrecy / Ciphertext stealing / EAX mode / Cryptography / Block cipher modes of operation / Stream ciphers

First Modes of Operation Workshop (October[removed]CTR Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:57
52Cipher / Key size / One-time pad / Cryptanalysis / Vigenère cipher / Substitution cipher / Alice and Bob / Key / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

Add to Reading List

Source URL: www.nasonline.org

Language: English - Date: 2014-08-04 15:09:41
53Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2004-11-10 12:15:25
54Ciphertext / Cipher / RC4 / One-time pad / Block cipher / KFB mode / Cryptography / Stream ciphers / Symmetric-key algorithm

Stream Ciphers for Constrained Environments Meltem S¨ onmez Turan National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:25:02
55Information theory / Fortuna / Key generation / Random number generation / Entropy / Niels Ferguson / One-time pad / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographi Pseudorandom Number Generator John Kelsey, Bru e S hneier, and Niels Ferguson Counterpane Systems; 101 E Minnehaha Parkway, Minneapolis, MN 55419,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
56Rotor machines / Enigma machine / One-time pad / Bates numbering / M-209 / Cryptography / Espionage / Cyberwarfare

DOCID[removed]lOP SECkEl DINAR The GEE System - V

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-04-14 10:04:06
57Cipher / Science / One-time pad / Cryptanalysis / Espionage / Substitution cipher / Vigenère cipher / Cryptography / Stream ciphers / Mathematical sciences

POCID: [removed]pproved for release by NSA on[removed], Transparency Case# 3852 IP er BY H. CAMPAIGNE

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-12-28 11:25:35
58Cryptographic protocols / Telecommunication / Communications protocol / One-time pad / RSA / Information theory / Cryptography / Formal sciences / Public-key cryptography

Leiden University Faculty of Science Mathematical Institute Master Thesis

Add to Reading List

Source URL: www.algant.eu

Language: English - Date: 2012-07-12 18:37:19
59Keystream / A5/1 / Block cipher / Linear feedback shift register / One-time pad / Cryptography / Stream ciphers / Cipher

Introduction to cryptography Ragni Ryvold Arnesen [removed] Norsk Regnesentral

Add to Reading List

Source URL: publications.nr.no

Language: English - Date: 2011-02-11 06:14:51
60Etiquette / Internet / Internet culture / Computing / Electronics / Bachelor pad / One-time pad / Acceptable use policy / Computer security / Email

Sully Buttes High School I-Pad Policies, Procedures, and Information Handbook & Student Acceptable Use Policies

Add to Reading List

Source URL: www.abo.k12.sd.us

Language: English - Date: 2012-08-22 16:33:20
UPDATE