CS-Cipher

Results: 180



#Item
161Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
162Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

PDF Document

Add to Reading List

Source URL: www.rr.cs.cmu.edu

Language: English - Date: 2006-04-09 12:21:08
163IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
164Block cipher / Message authentication codes / Mercy / Initialization vector / Authenticated encryption / Cipher / CBC-MAC / Feistel cipher / Advantage / Cryptography / Block cipher modes of operation / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2003-07-07 17:57:00
165Block cipher / Authenticated encryption / Stream cipher / Cipher / Index of cryptography articles / AEAD block cipher modes of operation / Block cipher modes of operation / Cryptography / EAX mode

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:53:47
166CBC-MAC / CMAC / Block cipher / Feistel cipher / Pseudorandomness / Pseudorandom permutation / Pseudorandom function family / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-04-04 15:10:03
167Public-key cryptography / Encryption / Symmetric-key algorithm / Semantic security / Information-theoretic security / Chosen-plaintext attack / ElGamal encryption / Data Encryption Standard / DES-X / Cryptography / Cipher / Authenticated encryption

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-05-11 20:53:55
168Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.plu.edu

Language: English - Date: 2003-02-21 11:38:34
169Pseudorandomness / Feistel cipher / ICE / Block cipher / Pseudorandom function family / Commitment scheme / Advantage / Exclusive or / Optimal asymmetric encryption padding / Cryptography / Permutations / Unpredictable permutation

PDF Document

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2006-11-27 11:45:50
170Stream ciphers / Ciphertext / Cyberwarfare / Espionage / Classical cipher / Transposition cipher / Substitution cipher / Cipher / Chosen-plaintext attack / Cryptography / Permutations / Mathematics

PDF Document

Add to Reading List

Source URL: www.cs.uiuc.edu

Language: English - Date: 2007-09-05 08:00:10
UPDATE