Ciphertext stealing

Results: 76



#Item
1Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
2A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
3A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
4The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
5The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2  Haibin Zhang1

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-03-23 10:23:39
6CS255: Cryptography and Computer Security  Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
7Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
8Security I – exercises Markus Kuhn Easter 2015 – CST Part IB  1

Security I – exercises Markus Kuhn Easter 2015 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-23 10:19:24
9Security I – exercises Markus Kuhn Lent 2014 – CST Part IB  1

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19
10Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12