Ciphertext

Results: 697



#Item
451Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
452Symbol / Decisional Diffie–Hellman assumption / Applied mathematics / Cyberwarfare / Mathematics / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An Investigation of Some Forward Security Properties for PEKS and IBE Qiang Tang APSIA group, SnT, University of Luxembourg 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-17 11:29:53
453Ciphertext stealing / Block cipher / Initialization vector / Block size / Applied mathematics / Ciphertext / Cipher / Padding / Secrecy / Cryptography / Block cipher modes of operation / Cyberwarfare

NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:25:13
454Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
455Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
456Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
457Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
458RSA / Ciphertext / Advantage / Cipher / Key / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Deterministic encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:44:19
459Ciphertext indistinguishability / Advantage / Block cipher / Ciphertext / Cyberwarfare / Applied mathematics / Secrecy / Cryptography / Block cipher modes of operation / Authenticated encryption

The Associated-Data Problem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:33:09
460Authenticated encryption / OCB mode / Cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:34:11
UPDATE