Chosen-ciphertext attack

Results: 243



#Item
91Ciphertext / Keystream / Cipher / Block cipher / WAKE / Chosen-plaintext attack / Cryptography / Stream ciphers / Block cipher modes of operation

Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
92Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
93Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
94Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
95Initialization vector / Known-plaintext attack / Stream cipher / Ciphertext / Cipher / Chosen-plaintext attack / Wireless Transport Layer Security / Transport Layer Security / Cryptography / Espionage / Cyberwarfare

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38
96McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
97Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
98Certificate-based encryption / Advantage / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Electronic commerce

Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-06 23:12:57
99Block cipher / RSA / Chosen-plaintext attack / Ciphertext stealing / Triple DES / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2006 Assignment #1 Due: Wednesday, Feb. 1st, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-26 14:21:46
UPDATE