Block cipher

Results: 1020



#Item
271Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
272Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
273RC6 / Advanced Encryption Standard / Q / Blowfish / VEST / SHA-1 / Data Encryption Standard / Cryptography / Cryptographic hash functions / Block ciphers

Automatic Formal Verification of Block Cipher Implementations

Add to Reading List

Source URL: verify.stanford.edu

Language: English - Date: 2010-02-18 01:25:10
274Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Authenticated encryption / Cryptographic nonce / Advanced Encryption Standard / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
275Distributed hash table / Cryptography / Block cipher modes of operation / Kademlia / Technology / Science / Computing / Distributed data storage / PlanetLab / Public-key cryptography

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Sociclai Networks Shirin Nilizadeh*, Sonia Jahid+, Prateek Mittal+, Nikita Borisov+, Apu Kapadia* *Indiana University Bloomington, +University of Illin

Add to Reading List

Source URL: mypage.iu.edu

Language: English - Date: 2012-10-14 20:17:33
276Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
277Stream ciphers / Ciphertext / Cipher / Symmetric-key algorithm / Block cipher / ElGamal encryption / Key / Cryptanalysis / RSA / Cryptography / Public-key cryptography / Key management

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
278Ciphertext / Initialization vector / Public-key cryptography / Mix network / RSA / Cipher / Padding / Block cipher / Anonymous remailer / Cryptography / Mixminion / Onion routing

Minx: A Simple and Efficient Anonymous Packet Format George Danezis Ben Laurie University of Cambridge, Computer Laboratory,

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:39
279Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
UPDATE