<--- Back to Details
First PageDocument Content
Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography
Date: 2010-03-10 01:08:56
Block cipher modes of operation
Watermarking attack
Block cipher
Ciphertext
RSA
Advanced Encryption Standard
Probabilistic encryption
Disk encryption theory
Cryptography
Disk encryption
Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Download Document from Source Website

File Size: 61,32 KB

Share Document on Facebook

Similar Documents

Digital watermarking / Espionage / Audio watermark detection / Copy attack / Watermark / Steganography / Image denoising / Digital Watermarking Alliance / Watermarking / Cryptography / Security

Proceedings of SPIE: Security and Watermarking of Multimedia Content II, Vol. 3971, January 2000, San Jose, CA, USA.

DocID: GzyK - View Document

Identification / Digimarc / Digital watermarking / Watermark / Magnetic stripe card / Smart card / Identity document / Copy attack / Card reader / Security / Watermarking / Cryptography

ENHANCING PERSONAL IDENTITY VERIFICATION WITH DIGITAL WATERMARKS INTRODUCTION This white paper provides a response to a NIST request from the October 7, 2004 meeting regarding the Homeland Security Presidential Directiv

DocID: qTTr - View Document

Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

DocID: 64pb - View Document

Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Watermarking attack / Block cipher / Cryptoloop / Initialization vector / Mercy / Encrypting File System / Cryptography / Disk encryption / Cryptographic software

PDF Document

DocID: 133E - View Document