Ciphertext

Results: 697



#Item
201Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
202Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
203Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
204SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
205Cryptography / Ciphertext indistinguishability / Learning with errors

Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz1? , Daniel Masny1?? , Krzysztof Pietrzak2? ? ? 1 Horst-G¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 02:59:10
206Serpent / ICE / Advanced Encryption Standard / Completeness / Chosen-plaintext attack / Crypt / Ciphertext / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
207Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
208RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
209Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
210Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE