Ciphertext

Results: 697



#Item
341ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
342Ciphertext / Technology / Public-key cryptography / Electronic commerce / RSA

Discovering PIN Prints In Mobile Applications Tomáš Rosa Raiffeisenbank, a.s. ATA Scenario

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2013-02-28 02:42:05
343RSA / Ciphertext / Transport Layer Security / Cryptography / Public-key cryptography / Electronic commerce

Scalable Private Set Intersection Cardinality for Capture-Recapture with Multiple Private Datasets Sebastian Zander, Lachlan L. H. Andrew, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 1

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2013-10-02 06:35:47
344Cyberwarfare / Cryptographic hash function / Ciphertext / Collision attack / Hash function / Collision resistance / Security / One-way compression function / Cryptography / Block cipher / Espionage

Microsoft PowerPoint - Klima_SPI

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
345Password / Ciphertext indistinguishability / Dropbox / Comodo Group / Unified Extensible Firmware Interface / Crypt / Chosen-plaintext attack / Man-in-the-middle attack / Plaintext / Software / Computing / Cryptography

Security Now! #Q&A #208  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-17 16:05:33
346Cipher / Block cipher / Chosen-plaintext attack / Advantage / Symmetric-key algorithm / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

CS255: Cryptography and Computer Security Winter 2015 Assignment #1 Due: Wednesday, Jan. 28, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-19 23:38:58
347Ciphertext / ElGamal encryption / Diffie–Hellman key exchange / One-time pad / Cipher / Key / Digital signature / Integrated Encryption Scheme / Malleability / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-03-01 20:32:14
348Authenticated encryption / Chosen-plaintext attack / Block cipher modes of operation / Advantage / Chosen-ciphertext attack / Ciphertext / Block cipher / Data Encryption Standard / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006 Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-17 21:22:01
349Phelix / Block cipher / RC4 / Ciphertext / Symmetric-key algorithm / Cipher / Advanced Encryption Standard / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
350Advantage / Semantic security / RSA / Ciphertext indistinguishability / Keystream / Cryptography / Electronic commerce / Public-key cryptography

CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-01 19:29:53
UPDATE