Ciphertext

Results: 697



#Item
241SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
242Ciphertext / Chosen-plaintext attack / ICE / Cryptanalysis / Stream cipher / Grain / Linear cryptanalysis / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Block cipher

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
243SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
244Advanced Encryption Standard / Ciphertext / Stream ciphers

Differential Fault Analysis on the AES Key Schedule Junko TAKAHASHI and Toshinori FUKUNAGA NTT Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corporation, {takahashi.junko, fukunaga.toshinori}@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-27 04:55:53
245Advantage / Public-key cryptography / Key generation / Cryptography / Mihir Bellare / Ciphertext indistinguishability

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:59:14
246Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
247Cryptography / Finite fields / Steganography / Ciphertext indistinguishability / XTR / Information theory / Randomized algorithm / Theoretical computer science / Espionage / Applied mathematics

Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le1 ∞

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 15:01:13
248Cipher / XTR / Key / Cryptography / Ciphertext indistinguishability / Public-key cryptography

Efficient Provably-Secure Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci Dipartimento di Informatica ed Applicazioni, Universit`a di Salerno, 84084 Fisciano (SA), Italy {ads

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-03 13:15:33
249Cyberwarfare / Applied mathematics / Lattice-based cryptography / Lattice / RSA / Ciphertext indistinguishability / Ideal lattice cryptography / Cryptography / Mathematics / Learning with errors

Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-30 13:28:50
250Learning with errors / Machine learning / Ciphertext indistinguishability / RSA / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce

How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-21 15:54:23
UPDATE