Ciphertext stealing

Results: 76



#Item
21Stream cipher / Block cipher / RSA / Ciphertext stealing / Key clustering / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2009 Assignment #1 Due: Wednesday, Jan. 28, 2009, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-20 20:45:19
22Block cipher / RSA / Chosen-plaintext attack / Ciphertext stealing / Triple DES / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2006 Assignment #1 Due: Wednesday, Feb. 1st, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-26 14:21:46
23RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
24RSA / Block cipher / Ciphertext stealing / Proxy re-encryption / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2008 Assignment #1 Due: Wednesday, Jan. 30, 2008, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-01-22 22:54:40
25Block cipher / Chosen-plaintext attack / One-time pad / Cipher / Ciphertext stealing / Vigenère cipher / Cryptography / Stream ciphers / Ciphertext

CS255: Cryptography and Computer Security Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-18 19:58:02
26Crypt / Block cipher modes of operation / Ciphertext stealing / Cryptography / Ciphertext / Cipher

USAISEC Technical Report ASQB-OSO-S-TR[removed]A 24-bit Encryption Algorithm for Linking Protection (Johnson Algorithm) Eric E. Johnson

Add to Reading List

Source URL: tracebase.nmsu.edu

Language: English - Date: 2012-02-25 18:52:43
27Cipher / Block cipher / Chosen-plaintext attack / Advantage / Symmetric-key algorithm / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

CS255: Cryptography and Computer Security Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-19 23:38:58
28Ciphertext stealing / Authenticated encryption / Padding / Cipher / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

Second Modes of Operation Workshop (August[removed]The XCBC-XOR, XECB-XOR and XECB-MAC Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:07:48
29Block cipher / IAPM / Authenticated encryption / Advanced Encryption Standard / Message authentication codes / Ciphertext stealing / AEAD block cipher modes of operation / Cryptography / Block cipher modes of operation / OCB mode

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: OCB Mode: Parallelizable Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:40:12
30OCB mode / IAPM / Authenticated encryption / CBC-MAC / Block cipher / Initialization vector / Padding / Ciphertext stealing / Block size / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Second Modes of Operation Workshop (August 2001)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:06:24
UPDATE