Ciphertext

Results: 697



#Item
161Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
162Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2012-10-14 17:28:33
163Random oracle / Forking lemma / Advantage / Schnorr signature / Full Domain Hash / Standard model / Public-key cryptography / Cryptography / Ciphertext indistinguishability / Digital signature

Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla1 , Pierre-Alain Fouque2 , Vadim Lyubashevsky1 , and Mehdi Tibouchi3 ´ Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-18 04:58:38
164Advantage / Project Nike / ElGamal encryption / Diffie–Hellman key exchange / Ciphertext indistinguishability / Standard model / Random oracle / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Public-key cryptography / Cryptographic protocols

Non-Interactive Key Exchange? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Kenneth G. Paterson1,‡ 1 Royal Holloway, University of London

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 16:38:11
165Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
166Fault injection / Software testing / RSA / Glitch / Differential fault analysis / Advanced Encryption Standard / Fault / Ciphertext / Power analysis / Cryptography / Geology / Digital electronics

The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El1 Hamid Choukri2,3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-07 04:14:56
167Public-key cryptography / Internet protocols / Electronic commerce / Adaptive chosen-ciphertext attack / Transport Layer Security / Daniel Bleichenbacher / RSA / Padding / HTTP Secure / Cryptography / Secure communication / Cryptographic protocols

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-10 20:13:35
168Key management / Electronic commerce / RSA / Side channel attack / Public key fingerprint / Xen / Ciphertext / CPU cache / Key / Cryptography / Public-key cryptography / Cache

Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2012-12-24 14:28:56
169Ciphertext / Caesar cipher / Known-plaintext attack / Cryptanalysis / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-01-19 20:59:56
170Needham–Schroeder protocol / Ciphertext indistinguishability / Kerberos / Advantage / XTR / Ticket Granting Ticket / Cryptography / Cryptographic protocols / Computer network security

Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:17:14
UPDATE