Ciphertext

Results: 697



#Item
391Cipher / Zodiac / Mathematical sciences / Science / Cyberwarfare / Cryptography / Substitution cipher / Ciphertext

Improved Decipherment of Homophonic Ciphers Malte Nuhn and Julian Schamper and Hermann Ney Human Language Technology and Pattern Recognition Computer Science Department, RWTH Aachen University, Aachen, Germany @

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
392Computing / Secure communication / Encryption / Ciphertext / IPsec / Homomorphic encryption / Middlebox / Cipher / Cryptography / Espionage / Cyberwarfare

Big Aggregation and Intermediaries: threat or menace? Jan Seedorf, Eliot Lear, Joe Hildebrand, Barbara Fraser (Moderated by Barry Leiba)

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

Language: English - Date: 2014-03-01 03:17:08
393Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
394Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
395Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
396Encryption / Cipher / Cryptanalysis / Advanced Encryption Standard / Index of cryptography articles / Cryptography / Ciphertext / Symmetric-key algorithm

JOINT SCHEMES FOR PHYSICAL LAYER SECURITY AND ERROR CORRECTION Oluwayomi Bamidele Adamo, B.S., M.S. Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 16:04:57
397Ciphertext / Cryptanalysis / Japanese cryptology from the 1500s to Meiji / Cipher / VEST / Cryptography / Stream ciphers / Substitution cipher

Probabilistic Methods for a Japanese Syllable Cipher Sujith Ravi and Kevin Knight Information Sciences Institute Computer Science Department University of Southern California

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2009-04-13 11:31:05
398Running key cipher / Classical cipher / Keyword cipher / Ciphertext / Cipher / Tabula recta / Known-plaintext attack / One-time pad / Kasiski examination / Cryptography / Stream ciphers / Substitution cipher

Decoding Running Key Ciphers Sravana Reddy∗ Department of Computer Science The University of Chicago 1100 E. 58th Street Chicago, IL 60637, USA

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2012-06-21 10:18:58
399Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
400Malleability / Locally decodable code / Forward error correction / Ciphertext indistinguishability / Code / Mathematics / Information / Telecommunications engineering / Error detection and correction / Cryptography / Coding theory

Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled University of Maryland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 09:13:58
UPDATE