Ciphertext

Results: 697



#Item
381Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
382Ciphertext / RSA / Learning with errors / Probabilistic encryption / Four-square cipher / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 11:54:01
383Electronic commerce / Chosen-ciphertext attack / Advantage / Ciphertext / Symbol / Key encapsulation / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms ? Shengli Liu1 and Kenneth G. Paterson2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:49:11
384Proof of knowledge / Mathematical proof / Zero-knowledge proof / Malleability / Ciphertext indistinguishability / Information / Knowledge / Cryptography / Cryptographic protocols / Mathematics

Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase Microsoft Research Redmond [removed] Markulf Kohlweiss

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:04
385Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as Report[removed]Verifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:58
386ICE / Cube attack / Ciphertext / Stream cipher / Trivium / Cipher / KN-Cipher / Crab / Cryptography / Block cipher / Key schedule

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, and Mohammad Reza Aref Sharif University of Technology, Tehran, Iran. {ahmadian,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-16 05:28:42
387Cipher / Zodiac / Mathematical sciences / Science / Cyberwarfare / Cryptography / Substitution cipher / Ciphertext

Improved Decipherment of Homophonic Ciphers Malte Nuhn and Julian Schamper and Hermann Ney Human Language Technology and Pattern Recognition Computer Science Department, RWTH Aachen University, Aachen, Germany @

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
388Cipher / Zodiac / Mathematical sciences / Science / Cyberwarfare / Cryptography / Substitution cipher / Ciphertext

Improved Decipherment of Homophonic Ciphers Malte Nuhn and Julian Schamper and Hermann Ney Human Language Technology and Pattern Recognition Computer Science Department, RWTH Aachen University, Aachen, Germany @

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
389Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
390Cipher / Zodiac / Mathematical sciences / Science / Cyberwarfare / Cryptography / Substitution cipher / Ciphertext

Improved Decipherment of Homophonic Ciphers Malte Nuhn and Julian Schamper and Hermann Ney Human Language Technology and Pattern Recognition Computer Science Department, RWTH Aachen University, Aachen, Germany @

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
UPDATE