Chosen-plaintext attack

Results: 179



#Item
81Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: blog.tempest.com.br

Language: English - Date: 2011-09-27 11:00:14
82IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
83Key / RSA / Advantage / Chosen-plaintext attack / Random oracle / Randomness / Probabilistic encryption / Ciphertext indistinguishability / Cryptography / Randomness extractor / Strong secrecy

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
84Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
85Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
86Security / Passphrase / Chosen-plaintext attack / Chosen-ciphertext attack / Crypt / Ciphertext / Key / Secure Shell / Known-plaintext attack / Cryptography / Espionage / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:33
87Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
88Computing / Security / HTTP / Internet protocols / Transport Layer Security / HTTP Secure / HTTP cookie / Cipher suite / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Secure communication

ATTACKS ON SSL A COMPREHENSIVE STUDY OF BEAST, CRIME, TIME, BREACH, LUCKY 13 & RC4 BIASES Pratik Guha Sarkar – [removed] Shawn Fitzgerald — [removed]

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2013-08-16 04:51:17
89Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
90Espionage / Security / Ciphertext indistinguishability / Ciphertext / RSA / Cipher / Known-plaintext attack / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Public-key cryptography / Cyberwarfare

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
UPDATE