Ciphertext

Results: 697



#Item
531Chosen-plaintext attack / Block cipher / Advanced Encryption Standard / ICE / Crypt / Cipher / Data Encryption Standard / Cryptography / Format-preserving encryption / Ciphertext

Public Comments on Draft SP 800-38G (2014); analysis of VAES3 (FF2)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-27 11:58:21
532

c Garrett 2004 quiz[removed]The ciphertext DROBKSXSXCZKSXPKVVCWKSXVIYXDROQKBKQO was encrypted with a shift cipher, from an English plaintext. Decrypt it efficiently without knowing the key. Show your work. Explain.

Add to Reading List

Source URL: www.math.umn.edu

- Date: 2004-05-17 15:52:05
    533Advanced Encryption Standard / Cryptanalysis / Ciphertext-only attack / Ciphertext / Boomerang attack / Chosen-plaintext attack / Cipher / Data Encryption Standard / Serpent / Cryptography / Espionage / Differential cryptanalysis

    Retro Cryptography „ What can YOU do with 1 Known Plaintext?

    Add to Reading List

    Source URL: www.spms.ntu.edu.sg

    Language: English - Date: 2010-12-07 00:14:22
    534Block cipher / AES implementations / Ciphertext stealing / Cryptography / Advanced Encryption Standard / Cipher

    SGCIPH20 AES CIPHER High Performance AES Encryption/Decryption Core Product Specification February 6, 2003

    Add to Reading List

    Source URL: www.stargatesemiconductor.com

    Language: English - Date: 2010-01-20 13:10:48
    535Block cipher modes of operation / Ciphertext stealing / Cryptography / Advanced Encryption Standard / Cipher

    SGCIPH60 AES CIPHER High Performance AES Encryption/Decryption Core Product Specification February 7, 2003

    Add to Reading List

    Source URL: www.stargatesemiconductor.com

    Language: English - Date: 2010-01-20 13:10:53
    536LOKI / Differential cryptanalysis / Alternating step generator / Summation generator / Lecture Notes in Computer Science / Cryptanalysis / Stream cipher / Cipher / SAFER / Cryptography / Block ciphers / Data Encryption Standard

    Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-06-19 04:38:45
    537Ciphertext / Caesar cipher / Known-plaintext attack / Cipher / Cryptanalysis / Chosen-plaintext attack / Four-square cipher / Cryptography / Stream ciphers / Vigenère cipher

    Vigenere Cipher in Lisp gene m. stover created Tuesday, 2004 August 3 updated Monday, 2006 April 17 Copyright copyright 2004, 2006 Gene Michael Stover. All rights reserved. Permission to copy, store, & view this document

    Add to Reading List

    Source URL: cybertiggyr.com

    Language: English - Date: 2014-06-08 02:17:23
    538Homomorphic encryption / Database schema / Public-key cryptography / Random oracle / ID-based encryption / Cryptography / Ciphertext indistinguishability / Obfuscation

    Towards a Unified Theory of Cryptographic Agents Shashank Agrawal ∗ Shweta Agrawal

    Add to Reading List

    Source URL: cryptome.org

    Language: English - Date: 2014-06-23 06:42:41
    539Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

    Add to Reading List

    Source URL: bbcr.uwaterloo.ca

    Language: English - Date: 2011-07-16 17:53:26
    540Mathematics / Applied mathematics / RSA / Lattice problem / Ciphertext indistinguishability / Ciphertext / Mathematical sciences / Rabin cryptosystem / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

    Multi-Bit Cryptosystems based on Lattice Problems Akinori Kawachi∗ Keisuke Tanaka∗ Keita Xagawa∗ Abstract We propose multi-bit versions of several single-bit cryptosystems based on lattice problems, the error-free

    Add to Reading List

    Source URL: xagawa.net

    Language: English - Date: 2010-01-23 11:51:00
    UPDATE