Chosen-plaintext attack

Results: 179



#Item
111Cipher / RSA / Public-key cryptography / Chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Encryption / ID-based encryption

Copyright by Allison Bishop Lewko 2012 The Dissertation Committee for Allison Bishop Lewko

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-07-16 23:33:58
112Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
113Secure communication / Electronic commerce / Transport Layer Security / Padding / Block cipher modes of operation / GnuTLS / Cipher suite / RC4 / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Internet protocols

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-08-09 07:53:35
114Cube attack / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Trivium / Block cipher / Chosen-plaintext attack / Cipher / Cryptography / Espionage / Stream ciphers

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
115ICE / Ciphertext / Linear feedback shift register / Chosen-plaintext attack / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / Stream cipher

Cryptanalysis of Hummingbird-1 Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
116Chosen-plaintext attack / Block cipher / Advanced Encryption Standard / ICE / Crypt / Cipher / Data Encryption Standard / Cryptography / Format-preserving encryption / Ciphertext

Public Comments on Draft SP 800-38G (2014); analysis of VAES3 (FF2)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-27 11:58:21
117Advanced Encryption Standard / Cryptanalysis / Ciphertext-only attack / Ciphertext / Boomerang attack / Chosen-plaintext attack / Cipher / Data Encryption Standard / Serpent / Cryptography / Espionage / Differential cryptanalysis

Retro Cryptography „ What can YOU do with 1 Known Plaintext?

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-07 00:14:22
118Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
119Ciphertext / Caesar cipher / Known-plaintext attack / Cipher / Cryptanalysis / Chosen-plaintext attack / Four-square cipher / Cryptography / Stream ciphers / Vigenère cipher

Vigenere Cipher in Lisp gene m. stover created Tuesday, 2004 August 3 updated Monday, 2006 April 17 Copyright copyright 2004, 2006 Gene Michael Stover. All rights reserved. Permission to copy, store, & view this document

Add to Reading List

Source URL: cybertiggyr.com

Language: English - Date: 2014-06-08 02:17:23
UPDATE