Block cipher modes of operation

Results: 320



#Item
271Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
272Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
273IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
274CMAC / Cryptographic hash functions / Tiny Encryption Algorithm / VMAC / Padding / Block cipher modes of operation / Block cipher / Permutation / Universal hashing / Cryptography / Message authentication codes / Mathematics

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2003-12-03 13:40:14
275One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Combinatorics / Mathematics

Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
276Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
277Known-plaintext attack / Cyclic redundancy check / Ciphertext / Py / XOR cipher / Block cipher modes of operation / Padding / Stream ciphers / Cryptography / Completeness

ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

Add to Reading List

Source URL: math.ucr.edu

Language: English - Date: 2006-03-09 16:25:49
278Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
279Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
280Pseudorandom number generators / Secure communication / Internet protocols / RC4 / Transport Layer Security / Keystream / Cipher suite / Block cipher modes of operation / E0 / Cryptography / Stream ciphers / Cryptographic protocols

A preliminary version of this paper appears in the proceedings of the USENIX Security Symposium[removed]This is the full version.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-05 12:29:08
UPDATE