Ciphertext

Results: 697



#Item
411Monoid / Ciphertext / Cipher / Learning with errors / Transposition cipher / Classical cipher / Stream cipher / Mathematical sciences / Cryptography / Mathematics / Algebra

Sage Reference Manual: Cryptography Release 6.3 The Sage Development Team August 11, 2014

Add to Reading List

Source URL: www.sagemath.org

Language: English - Date: 2014-11-16 14:58:22
412RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
413Obfuscation / Obfuscated code / Homomorphic encryption / Zero-knowledge proof / RSA / ID-based encryption / Encryption / Cryptography / Ciphertext indistinguishability / Semantic security

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA [removed] Mariana Raykova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-21 10:06:46
414Circuit complexity / Multilinear algebra / Theoretical computer science / Cryptography / Multilinear map / NC / Obfuscated code / Permutation / Ciphertext indistinguishability / Mathematics / Applied mathematics / Computing

Protecting Obfuscation Against Algebraic Attacks Boaz Barak ∗ Sanjam Garg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-13 19:01:19
415Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]Dag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 1

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
416Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
417Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
418Block cipher / Advanced Encryption Standard / ICE / Linear cryptanalysis / Symmetric-key algorithm / S-box / Key schedule / Cryptanalysis / Ciphertext / Cryptography / Data Encryption Standard / Differential cryptanalysis

Copyright 2004, The Mathematical Association of America. All rights reserved. First published in the American Mathematical Monthly. Reprinted by permission. Polynomials in the Nation’s Service: Using Algebra to Design

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:30:18
419Symmetric-key algorithm / Public key infrastructure / Key / Digital signature / Certificate policy / Ciphertext / X.509 / Cipher / Cryptosystem / Cryptography / Key management / Public-key cryptography

Overview of PKI for the CSOS Program

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:26:06
420Computing / Internet / Degree of anonymity / Ciphertext indistinguishability / Anonymity / Onion routing / Tor / Differential privacy / Adversary model / Internet privacy / Cryptography / Cryptographic software

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-14 06:53:59
UPDATE