Ciphertext

Results: 697



#Item
501Special purpose file systems / Advanced Encryption Standard / Ciphertext / Block cipher / Filesystem-level encryption / Cipher / Padding / Block cipher modes of operation / Disk encryption theory / Cryptography / Disk encryption / Cryptographic software

HADOOP Cryptographic File System {yi.a.liu, tianyou.li, uma.gangumalla, andrew.k.purtell, avik.dey, niraj.rai}@intel.com, [removed] Mar 19, 2014 Contents

Add to Reading List

Source URL: issues.apache.org

Language: English
502Block cipher / Linear cryptanalysis / Confusion and diffusion / Q / Permutation / Ciphertext / Cipher / Substitution cipher / BassOmatic / Cryptography / Mathematics / Substitution-permutation network

Substitution-Permutation Networks and Linear Cryptanalysis

Add to Reading List

Source URL: www.csc.kth.se

Language: English
503RSA / Cryptosystem / Key / Hybrid cryptosystem / Ciphertext indistinguishability / Index of cryptography articles / RSA problem / Cryptography / Public-key cryptography / Electronic commerce

Report on Present State of EPOC-2 Cryptosystem Evaluation (full evaluation) January 28, 2002 Hajime Watanabe, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
504Ciphertext / Initialization vector / Public-key cryptography / Mix network / RSA / Cipher / Padding / Block cipher / Anonymous remailer / Cryptography / Mixminion / Onion routing

PDF Document

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:39
505Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
506FIPS 140-2 / Block cipher modes of operation / Public-key cryptography / FIPS 140 / Zeroisation / Critical Security Parameter / Symmetric-key algorithm / Ciphertext / Password / Cryptography / Key management / Key

Security Policy: Astro Subscriber Encryption Module Astro Saber, Astro Spectra, Astro Consolette, XTS3000 Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
507Ciphertext indistinguishability / Cipher / Espionage / Security / Cramer–Shoup cryptosystem / Integrated Encryption Scheme / Cryptography / Cyberwarfare / ID-based encryption

Why Proving HIBE Systems Secure is Difficult Allison Lewko Brent Waters Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-17 14:00:59
508Ciphertext / Cipher / RSA / Encryption / Key / Proxy re-encryption / Cryptography / ID-based encryption / Chosen-ciphertext attack

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
509Advantage / Ciphertext / Cipher / RSA / Key / Public-key cryptography / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / ID-based encryption

Achieving Leakage Resilience Through Dual System Encryption Allison Lewko ∗ University of Texas at Austin [removed] Yannis Rouselakis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-26 03:11:13
510Cipher / RSA / Public-key cryptography / Chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Encryption / ID-based encryption

Copyright by Allison Bishop Lewko 2012 The Dissertation Committee for Allison Bishop Lewko

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-07-16 23:33:58
UPDATE