Ciphertext

Results: 697



#Item
81Cryptography / Computer security / Language-based security / KeY / Ciphertext indistinguishability / Universal composability

A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

Add to Reading List

Source URL: grsrd.uni.lu

Language: English - Date: 2013-04-09 08:10:38
82Cryptography / Onion routing / Chosen-ciphertext attack / Public-key cryptography / Transmission Control Protocol / Mix network / RSA / Encryption / Mixminion

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2008-05-30 10:39:07
83Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
84Cryptography / Public-key cryptography / Ciphertext indistinguishability / Cryptographic protocols / Cryptographic software / Chosen-ciphertext attack / RSA / Key exchange / Advantage / CryptoVerif / Semantic security / Strong secrecy

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-16 06:52:57
85

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-09-01 21:54:59
    86Pseudorandom function family / Ciphertext indistinguishability / Cipher / Differential cryptanalysis / Stream cipher / Cryptography / Advantage / Block cipher

    BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

    Add to Reading List

    Source URL: www.brics.dk

    Language: English - Date: 2001-11-06 09:17:54
    87Ciphertext / Cipher / Espionage / Vigenère cipher / Cryptography / Chaocipher / Cyberwarfare

    Chaocipher: Exhibit 5 Solution by Jeff CalofThe photograph above is of the actual, printed document prepared by Prof. Cipher Deavours and Louis Kruh (with John Byrne) as found in the donated Byrne Family files

    Add to Reading List

    Source URL: www.mountainvistasoft.com

    Language: English - Date: 2014-03-22 13:51:16
    88Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

    Add to Reading List

    Source URL: www.dtc.umn.edu

    Language: English - Date: 1999-02-17 16:51:49
    89RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

    CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-11 11:47:35
    90Semantic security / Optimal asymmetric encryption padding / Cipher / RSA / Advantage / Encryption / Side channel attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

    main_CameraReadyFormatting.dvi

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2012-05-14 19:11:08
    UPDATE