CS-Cipher

Results: 180



#Item
1Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-02-21 21:04:37
2Keyword cipher / Product rule / Index of Abkhazia-related articles

Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-04-10 14:33:51
3Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
4Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
5Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
6Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
7Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
8Keyword cipher

Browser Enhancements Against Phishing Attacks Rohin Dabas Adrian Perrig Dawn Song

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-07-08 22:36:51
    9Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

    On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2010-12-10 03:09:04
    10Cryptography / Pseudorandomness / Advantage / Semantic security / Negligible function / Provable security / Concrete security / Pseudorandom permutation / Pseudorandom generator theorem / Pseudorandom generator / Ciphertext indistinguishability / Block cipher

    On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2005-06-19 20:47:33
    UPDATE