Ciphertext

Results: 697



#Item
621Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
622RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
623Symmetric-key algorithm / Key size / Cipher / Block ciphers / Message authentication codes / Poly1305-AES / Differential cryptanalysis / Cryptography / Advanced Encryption Standard / Ciphertext

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Add to Reading List

Source URL: www2.cs.uni-paderborn.de

Language: English - Date: 2004-07-08 11:01:15
624Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

1 New Weak-Key Classes of IDEA

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
625Known-plaintext attack / Cyclic redundancy check / Ciphertext / Py / XOR cipher / Block cipher modes of operation / Padding / Stream ciphers / Cryptography / Completeness

ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

Add to Reading List

Source URL: math.ucr.edu

Language: English - Date: 2006-03-09 16:25:49
626Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
627Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
628Ciphertext / Cipher / Transposition cipher / Stream cipher / Advanced Encryption Standard / Block cipher / Caesar cipher / Classical cipher / Cryptography / Permutations / Substitution cipher

CSC 405 Introduction to Computer Security Homework Assignment #1 Solutions

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:18:44
629Key schedule / MISTY1 / Differential cryptanalysis / Advanced Encryption Standard / ICE / Feistel cipher / Ciphertext / Cryptanalysis / Cipher / Cryptography / Integral cryptanalysis / Block cipher

Integral Cryptanalysis (Extended abstract) Lars Knudsen1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-09-01 01:52:26
630Ciphertext / One-time pad / Chosen-plaintext attack / Gilbert Vernam / Cryptanalysis / Cipher / Vigenère cipher / Ciphertext stealing / Cryptography / Stream ciphers / Keystream

A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis

Add to Reading List

Source URL: csis.bits-pilani.ac.in

Language: English - Date: 2008-05-21 02:03:20
UPDATE