Block cipher modes of operation

Results: 320



#Item
51Mathematics / Logic in computer science / Homomorphic encryption / Computational complexity theory / Boolean circuit / Block cipher modes of operation / Advanced Encryption Standard / Circuit / Block cipher / Theoretical computer science / Cryptography / Applied mathematics

Armadillo: a compilation chain for privacy preserving applications Sergiu Carpov, Paul Dubrulle, Renaud Sirdey CEA, LIST, Embedded Real Time & Security Laboratory,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 03:12:34
52Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
53ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
54Chiang Mai / Block cipher modes of operation / Concrete security / Message authentication codes / Cryptography / Mihir Bellare / Phillip Rogaway

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
55CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
56Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
57Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
58Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
59Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
60Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
UPDATE