Ciphertext

Results: 697



#Item
311Cipher / RSA / Key / Chosen-plaintext attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A talk in 32 parts Onion Misc Examples

Add to Reading List

Source URL: www.linuxsa.org.au

Language: English - Date: 2011-08-14 22:08:52
312Block cipher / Chosen-plaintext attack / One-time pad / Cipher / Ciphertext stealing / Vigenère cipher / Cryptography / Stream ciphers / Ciphertext

CS255: Cryptography and Computer Security Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-18 19:58:02
313Deterministic encryption / Mathematical sciences / Science / Ciphertext indistinguishability / Cryptography / Advantage / Ciphertext

CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-12 00:12:50
314ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
315Privacy / Differential privacy / Ciphertext / RSA / Cipher / Completeness / Advantage / ICE / Internet privacy / Cryptography / Homomorphic encryption / ElGamal encryption

Data Collection With Self-Enforcing Privacy Philippe Golle Frank McSherry Ilya Mironov

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-11-30 12:42:35
316Cipher / Substitution cipher / Playfair cipher / Caesar cipher / Block cipher / Transposition cipher / Cryptanalysis / One-time pad / Advanced Encryption Standard / Cryptography / Stream ciphers / Ciphertext

Microsoft PowerPoint - 02-classical_encryption.pptx

Add to Reading List

Source URL: faculty.ksu.edu.sa

Language: English - Date: 2009-03-05 06:09:13
317PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-04-25 03:42:22
318Block cipher / Cipher / Stream cipher / Advanced Encryption Standard / ICE / Symmetric-key algorithm / Substitution cipher / S-box / Crypt / Cryptography / Data Encryption Standard / Ciphertext

SFWR 4C03: Computer Networks and Computer Security Mar[removed]Lecturer: Kartik Krishnan

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2005-12-03 12:37:56
319Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
320Cramer–Shoup cryptosystem / XTR / Symbol / Universal hashing / Applied mathematics / Mathematics / Artificial intelligence / Finite fields / Ciphertext indistinguishability / Cryptography

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing? Baodong Qin1,2 and Shengli Liu1,?? 1. Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 20

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 10:03:04
UPDATE