Block cipher

Results: 1020



#Item
261ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
262Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-22 00:23:21
263Chiang Mai / Block cipher modes of operation / Concrete security / Message authentication codes / Cryptography / Mihir Bellare / Phillip Rogaway

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
264CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
265Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
266Symmetric-key algorithm / Advanced Encryption Standard / Data Encryption Standard / Cipher / Stream cipher / S-box / Cryptographic hash function / Cellular automaton / Crypto++ / Cryptography / Block cipher / Joan Daemen

Innovations in symmetric cryptography Joan Daemen STMicroelectronics, Belgium SSTIC, Rennes, June 5, 2013

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2013-06-27 13:18:02
267Camellia / Twofish / ICE / Key whitening / Matrix / Feistel / Cryptography / Block ciphers / Feistel cipher

The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
268Cryptography / Padding / Block cipher

Introduction Finding Padding Oracles Basic PO attacks Advanced PO attacks Summary

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:29
269Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
270Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
UPDATE