Back to Results
First PageMeta Content
Ciphertext / Stream cipher / Advantage / Cryptanalysis / Cipher / Chosen-plaintext attack / Ciphertext stealing / Index of cryptography articles / Cryptography / Block cipher / Feistel cipher


Security I – exercises Markus Kuhn Lent 2013 – Part IB 1
Add to Reading List

Document Date: 2013-02-04 12:37:29


Open Document

File Size: 136,78 KB

Share Result on Facebook

Company

Wilson / CBC / Amorian / Trusting Trust / /

Currency

pence / /

Event

M&A / /

IndustryTerm

real-time applications / public telephone / software skills / cryptographic protocol / prepaid telephone chip card / usual algorithm / /

OperatingSystem

Unix / GNU / /

Organization

European Central Bank / Bumarian government / /

Person

Markus Kuhn Lent / /

Position

supervisor / designer / local system administrator / technician / programmer / /

PublishedMedium

Communications of the ACM / /

Technology

encryption / Cryptography / DES chip / 2.2 Protocols / Unix / Tatebayashi-Matsuzaki-Newman protocol / cryptographic protocol / block cipher / HTTP / secret key / usual algorithm / operating system / digital signature / stream cipher / /

URL

http /

SocialTag