Block cipher

Results: 1020



#Item
741Block cipher / RSA / Ciphertext stealing / Proxy re-encryption / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2012 Assignment #1 Due: Wednesday, Feb. 1, 2012, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-01-31 13:48:13
742Cipher / Block cipher / RSA / Ciphertext stealing / Integrated Encryption Scheme / Cryptography / Ciphertext / One-time pad

CS255: Cryptography and Computer Security Winter 2013 Assignment #1 Due: Wednesday, Feb. 6, 2013, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-01-24 15:46:41
743Cryptographic hash function / Authenticated encryption / RSA / Advanced Encryption Standard / Disk encryption theory / Cryptography / Block cipher / Entropy

Space-Efficient Block Storage Integrity Alina Oprea∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 21:17:41
744VEST / Cipher / Block cipher / Differential cryptanalysis / Key size / ESTREAM / Phelix / Grain / Stream ciphers / Cryptography / Py

The Truth on TPy Eli Biham∗

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2008-02-29 12:28:09
745Stream cipher / RSA / Ciphertext stealing / Format-preserving encryption / Cryptography / Cipher / Block cipher

CS255: Cryptography and Computer Security Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-01-25 16:01:23
746Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-03-10 01:08:56
747Cryptographic hash function / Cipher / Password / Message authentication code / Public-key cryptography / Index of cryptography articles / Stream cipher / Cryptography / Block cipher / Key

2007 Paper 3 Question 9 Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:45
748Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:43
749Secure communication / IEEE P1619 / Block cipher modes of operation / Cipher / Message authentication codes

2003 Paper 3 Question 9 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:38
750Ciphertext / Cipher / Feistel cipher / Symmetric-key algorithm / Cryptography / Block cipher modes of operation / Block cipher

2002 Paper 3 Question 2 Introduction to Security (a) (i ) Explain the collision resistance requirement for the hash function used in a digital signature scheme. [4 marks]

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:36
UPDATE