Ciphertext

Results: 697



#Item
631Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
632Alice and Bob / Ciphertext / RSA / Kerberos / XTR / Needham–Schroeder protocol / Security protocol notation / Cryptography / Cryptographic protocols / Public-key cryptography

Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-26 10:17:27
633Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
634GOST / Slide attack / Chosen-plaintext attack / Ciphertext / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Linear cryptanalysis / Integral cryptanalysis / Cryptography / Espionage / GOST standards

Improved Slide Attacks Eli Biham

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
635Substitution cipher / Chosen-plaintext attack / Cryptanalysis / Plaintext / Cipher / Frequency analysis / Data Encryption Standard / Initialization vector / One-time pad / Cryptography / Espionage / Ciphertext

397 PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3, MARCH 1979

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:07
636Cryptographic hash functions / HMAC / Key / Symmetric-key algorithm / SHA-2 / Ciphertext / Public-key cryptography / Index of cryptography articles / Book:Cryptography / Cryptography / Message authentication codes / Hashing

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
637ID-based encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Advanced Encryption Standard / Cryptography / Homomorphic encryption / Verifiable computing

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
638RSA / Chosen-ciphertext attack / PKCS / Cryptography / Public-key cryptography / Padding

PDF Document

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2012-07-19 08:35:43
639ID-based encryption / Cipher / Probabilistic encryption / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
640Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
UPDATE