Chosen-plaintext attack

Results: 179



#Item
141IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
142Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
143Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
144Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
145Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

644 IEEE

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
146IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
147Block cipher / Boomerang attack / Stream cipher / ICE / Advanced Encryption Standard / Cipher / Cryptanalysis / Symmetric-key algorithm / Chosen-plaintext attack / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Algebraic Techniques in Differential Cryptanalysis Martin Albrecht and Carlos Cid

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2009-03-31 06:03:14
148RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
149Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
150Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
UPDATE