Block cipher modes of operation

Results: 320



#Item
41Block cipher / Stream cipher / Chosen-ciphertext attack / Cipher / Chosen-plaintext attack / Transport Layer Security / RSA / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Padding

Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-30 18:34:48
42Ciphertext / RSA / Block cipher modes of operation / Cipher / ElGamal encryption / Semantic security / Symmetric-key algorithm / Blum–Goldwasser cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
43Key generation / Block ciphers / Disk encryption / Block cipher modes of operation / Cryptography / SEED / Key Wrap

SEED Algorithm Object Identifiers. SEED Algorithm Object Identifiers

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
44Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
45Block cipher modes of operation / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Block cipher / Symmetric-key algorithm / RSA / Stream ciphers / Ciphertext stealing / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
46Block cipher modes of operation / Block cipher / Cipher / Probabilistic encryption / RSA / Padding / Cryptography / Authenticated encryption / Initialization vector

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
47Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
48Block cipher modes of operation / Encryption software / Mask / Entropy / Cryptography / Advanced Encryption Standard / Stream cipher

Detecting Hidden Leakages Amir Moradi1 , Sylvain Guilley2,3 , Annelie Heuser2? 1 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-03-28 12:51:32
49Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
50SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
UPDATE