Ciphertext

Results: 697



#Item
541Software / Encryption software / Encryption / Ciphertext / Data security / Advanced Encryption Standard / BitLocker Drive Encryption / Cryptography / Cryptographic software / Disk encryption

Security and Snake Oil: Choosing the right encryption software One of the best solutions to the need to protect sensitive information is through data encryption.

Add to Reading List

Source URL: www.winencrypt.com

Language: English - Date: 2009-01-08 06:10:11
542Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
543Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
544Ciphertext / Key size / Cryptanalysis / Cryptographic hash function / Cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Advanced Encryption Standard / Block cipher

Microsoft PowerPoint - preneel_closing_isse11v3_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-11-25 16:02:48
545Homomorphic encryption / XTR / One-time pad / Key encapsulation / Cryptography / Ciphertext indistinguishability / Learning with errors

Lattice Cryptography for the Internet Chris Peikert∗ February 17, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-18 17:10:47
546Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Chosen-plaintext attack / Ciphertext / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
547Espionage / Substitution cipher / Linguistics / Frequency analysis / Cryptanalysis / Ciphertext / N-gram / Bigram / Cipher / Cryptography / Science / Natural language processing

Recent Researches in Communications, Automation, Signal Processing, Nanotechnology, Astronomy and Nuclear Physics Attacking Turkish Texts Encrypted by Homophonic Cipher SEFIK ILKIN SERENGIL 1 MURAT AKIN 2 1, 2

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2011-03-01 04:12:28
548Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
549Ciphertext / Chosen-plaintext attack / Block cipher / Linear cryptanalysis / Maximum likelihood / Likelihood function / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

LIKELIHOOD ESTIMATION FOR BLOCK CIPHER KEYS Sean Murphy, Fred Piper, Michael Walker(y), Peter Wild Information Security Group (y)Vodafone Limited Royal Holloway The Courtyard

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:16
550Ciphertext / Maximum likelihood / Chosen-plaintext attack / Differential cryptanalysis / Likelihood function / Block cipher / Normal distribution / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

Likelihood Estimation for Block Cipher Keys Sean Murphy, Fred Piper, Michael Walker and Peter Wild Technical Report RHUL–MA–2006–3

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-07-06 07:56:42
UPDATE