Initialization vector

Results: 165



#Item
121VEST / T-function / Cryptographic nonce / Initialization vector / Weak key / ICE / Keystream / Cryptography / Stream ciphers / Salsa20

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Simon Fischer1 , Willi Meier1 , Cˆome Berbain2 , Jean-Fran¸cois Biasse2 , and M.J.B. Robshaw2 1

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:33:19
122Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
123Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: db.csail.mit.edu

Language: English - Date: 2013-03-28 09:28:30
124Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
125Initialization vector / One-time pad / Ciphertext indistinguishability / Cryptography / Advantage / Binary tree

CS255: Introduction to Cryptography Winter 2014 Assignment #1: Solutions Answer 0. Let m0 be the message “attack at dawn”, m1 be the message “attack at dusk”, and c0 , c1 be

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-26 12:43:20
126Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
127Ciphertext / Pseudorandom number generator / Cipher / RC6 / One-time pad / Block cipher modes of operation / Cryptography / Initialization vector / Advanced Encryption Standard

Randomness Testing of the Advanced Encryption Standard Finalist Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
128Ciphertext / Cipher / Avalanche effect / Random number generation / Block cipher modes of operation / One-time pad / Cryptography / Initialization vector / Pseudorandom number generator

Randomness Testing of the Advanced Encryption Standard Candidate Algorithms Affiliation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
129Initialization vector / Cipher / Py / Rabbit / Crypt / MMH-Badger MAC / Cryptography / Stream ciphers / Block cipher modes of operation

Rabbit Stream Cipher, Algorithm Specification May 12, 2005

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 16:04:52
130IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
UPDATE