Ciphertext

Results: 697



#Item
611Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management

A “proof-reading” of some issues in cryptography Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2007-10-01 04:24:00
612Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / IEEE P1363 / RSA / Key encapsulation / Integrated Encryption Scheme / Chosen-ciphertext attack / Block cipher modes of operation / Random oracle / Cryptography / Cryptography standards / Public-key cryptography

A Proposal for an ISO Standard for Public Key Encryption (version 2.1) Victor Shoup

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-12-20 09:19:49
613Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
614Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
615Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
616Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
617Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
618Ciphertext / Block cipher / Cipher / Differential cryptanalysis / Cryptanalysis / Blowfish / Known-plaintext attack / Weak key / Vigenère cipher / Cryptography / Espionage / Slide attack

A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2008-10-23 15:16:37
619Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
620Applied mathematics / Security / Paillier cryptosystem / Cryptosystem / ElGamal encryption / Ciphertext / RSA / BRIC / Homomorphic encryption / Public-key cryptography / Cryptography / Cyberwarfare

BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-03-29 07:38:52
UPDATE