Ciphertext

Results: 697



#Item
361Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:12:18
362Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
363Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
364Authenticated encryption / Chosen-ciphertext attack / RSA / Semantic security / Advantage / Crypt / Cryptography / Deterministic encryption / Ciphertext

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
365Security / Passphrase / Chosen-plaintext attack / Chosen-ciphertext attack / Crypt / Ciphertext / Key / Secure Shell / Known-plaintext attack / Cryptography / Espionage / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:33
366Cipher / Man-in-the-middle attack / Transport Layer Security / Cryptography / Ciphertext / Public-key cryptography

Appeal: [removed]Doc: 66 Filed: [removed]

Add to Reading List

Source URL: pdfserver.amlaw.com

Language: English - Date: 2014-04-16 08:23:25
367Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
368Cryptography standards / Internet standards / Secure communication / RSA / PKCS / Transport Layer Security / Padding / Chosen-ciphertext attack / Key size / Cryptography / Public-key cryptography / Electronic commerce

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma♣, Ondřej Pokorný1 and Tomáš Rosa2,♣ 2 1 ICZ, Prague, Czech Republic Dept. of Computer Science and Eng., FEE, Czech Technical University in Prague

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-29 14:13:55
369Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
370Semantic security / Adaptive chosen-ciphertext attack / Cramer–Shoup cryptosystem / Chosen-ciphertext attack / Advantage / Ciphertext / RSA / Cipher / Key-recovery attack / Cryptography / Signcryption / Ciphertext indistinguishability

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
UPDATE