Authenticated encryption

Results: 182



#Item
61Electronic commerce / Secure communication / National security / Encryption / Authenticated encryption / Public-key cryptography / Computer security / Transport Layer Security / Information security / Cryptography / Security / Cryptographic protocols

INVITED PAPER Privacy and Cybersecurity: The Next 100 Years This paper discusses the interrelationship of privacy and cybersecurity and

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:27:06
62Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
63Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
64Cube attack / Cipher / Public-key cryptography / Encryption / International Data Encryption Algorithm / Authenticated encryption / Cryptographic hash function / Cryptography / Homomorphic encryption / Cryptanalysis

PROGRAM EUROCRYPT 2015 MONDAY, April 27th 9:00 9:15 Welcome

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2015-04-16 13:21:14
65McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
66Block cipher modes of operation / Authenticated encryption / Ticket Granting Ticket / Initialization vector / Secure Shell / Chosen-plaintext attack / Ciphertext / Key distribution center / Chosen-ciphertext attack / Cryptography / Cyberwarfare / Kerberos

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
67Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
68Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
69Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
70Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
UPDATE