Chosen-ciphertext attack

Results: 243



#Item
171TrueCrypt / Key / Cipher / Symmetric-key algorithm / Public-key cryptography / Encryption / Integrated Encryption Scheme / Chosen-ciphertext attack / Disk encryption / Cryptography / Computer security / Trusted Platform Module

1 Deleting Secret Data with Public Verifiability Feng Hao, Member, IEEE, Dylan Clarke, Avelino Francisco Zorzo Abstract The problem of secure data erasure has been extensively studied in the past with a rich body of lit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-25 03:36:16
172Chosen-plaintext attack / Block cipher / Advanced Encryption Standard / ICE / Crypt / Cipher / Data Encryption Standard / Cryptography / Format-preserving encryption / Ciphertext

Public Comments on Draft SP 800-38G (2014); analysis of VAES3 (FF2)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-27 11:58:21
173Advanced Encryption Standard / Cryptanalysis / Ciphertext-only attack / Ciphertext / Boomerang attack / Chosen-plaintext attack / Cipher / Data Encryption Standard / Serpent / Cryptography / Espionage / Differential cryptanalysis

Retro Cryptography „ What can YOU do with 1 Known Plaintext?

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-07 00:14:22
174Ciphertext / Caesar cipher / Known-plaintext attack / Cipher / Cryptanalysis / Chosen-plaintext attack / Four-square cipher / Cryptography / Stream ciphers / Vigenère cipher

Vigenere Cipher in Lisp gene m. stover created Tuesday, 2004 August 3 updated Monday, 2006 April 17 Copyright copyright 2004, 2006 Gene Michael Stover. All rights reserved. Permission to copy, store, & view this document

Add to Reading List

Source URL: cybertiggyr.com

Language: English - Date: 2014-06-08 02:17:23
175Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
176Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
177Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Chosen-plaintext attack / Ciphertext / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
178Ciphertext / Chosen-plaintext attack / Block cipher / Linear cryptanalysis / Maximum likelihood / Likelihood function / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

LIKELIHOOD ESTIMATION FOR BLOCK CIPHER KEYS Sean Murphy, Fred Piper, Michael Walker(y), Peter Wild Information Security Group (y)Vodafone Limited Royal Holloway The Courtyard

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:16
179Ciphertext / Maximum likelihood / Chosen-plaintext attack / Differential cryptanalysis / Likelihood function / Block cipher / Normal distribution / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

Likelihood Estimation for Block Cipher Keys Sean Murphy, Fred Piper, Michael Walker and Peter Wild Technical Report RHUL–MA–2006–3

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-07-06 07:56:42
180Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
UPDATE