Ciphertext

Results: 697



#Item
351IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Ciphertext / Cryptography / Computer network security / Cryptographic protocols

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
352Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: blog.tempest.com.br

Language: English - Date: 2011-09-27 11:00:14
353Mathematics / Ciphertext / Cipher / Code / Australian Association of Mathematics Teachers / Cyberwarfare / Applied mathematics / Substitution cipher / Caesar cipher / Cryptography / Rail Fence Cipher / Transposition cipher

Microsoft Word - rail-fence cipher.doc

Add to Reading List

Source URL: www.aamt.edu.au

Language: English
354Cipher / Cyberwarfare / Espionage / Security / Cryptography / Ciphertext / Symmetric-key algorithm

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jea

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:19
355Key / RSA / Advantage / Chosen-plaintext attack / Random oracle / Randomness / Probabilistic encryption / Ciphertext indistinguishability / Cryptography / Randomness extractor / Strong secrecy

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
356Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
357Message authentication codes / Cryptography / Ciphertext indistinguishability

Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
358ID-based encryption / Advantage / Paillier cryptosystem / Boneh/Franklin scheme / Random oracle / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
359Cipher / Plaintext / Deterministic encryption / Cryptography / Homomorphic encryption / Ciphertext

Boyens, Günther Using Online Services in Untrusted Environments Using Online Services in Untrusted Environments: A Privacy-Preserving Architecture

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2003-06-05 15:05:25
360Cipher / Cryptography / Homomorphic encryption / Ciphertext

FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-28 06:08:51
UPDATE