Ciphertext

Results: 697



#Item
151McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
152Ciphertext / Block cipher modes of operation / Advantage / Network packet / Cipher / Cyberwarfare / Information / Applied mathematics / Cryptography / Transmission Control Protocol / Initialization vector

Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-07-22 20:05:52
153Cryptography / Ciphertext indistinguishability

How  Secure  is  Determinis0c  Encryp0on?   Mihir  Bellare   Rafael  Dowsley   Sriram  Keelveedhi      

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-04-09 10:28:09
154Ciphertext indistinguishability / Obfuscation / International Obfuscated C Code Contest / Identical particles / Function / Physics / Mathematics / Geolocation / Location obfuscation

J. Cuellar, M. Ochoa, and R. Rios, “Indistinguishable Regions in Geographic Privacy”, 27th Annual ACM Symposium on Applied Computing (SAC 2012), S. Ossowski, and P. Lecca Eds., ACM, pp, 26-30 MarchI

Add to Reading List

Source URL: www.nics.uma.es

Language: English - Date: 2013-11-21 04:51:54
155Cipher / Block cipher / Stream cipher / Substitution cipher / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Symmetric-key algorithm / Ciphertext

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16
156Block cipher modes of operation / Authenticated encryption / Ticket Granting Ticket / Initialization vector / Secure Shell / Chosen-plaintext attack / Ciphertext / Key distribution center / Chosen-ciphertext attack / Cryptography / Cyberwarfare / Kerberos

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
157Cryptography / Keystroke logging / Ciphertext / Chosen-plaintext attack / Espionage / Cryptanalysis / Cryptology

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:31
158Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
159Encryption / Homomorphic encryption / Cipher / Science / Knowledge / Ethology / Cryptography / Deterministic encryption / Ciphertext

Köhler et al. Journal of Cloud Computing: Advances, Systems and Applications:1 DOIs13677RESEARCH

Add to Reading List

Source URL: www.journalofcloudcomputing.com

Language: English
160Cipher / Advantage / RSA / Cryptography / Format-preserving encryption / Ciphertext indistinguishability

Practical Solutions For Format-Preserving Encryption Mor Weiss Boris Rozenberg Muhammad Barham

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:17
UPDATE