Initialization vector

Results: 165



#Item
11Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
12Cryptography / Block cipher modes of operation / Ciphertext stealing / Ciphertext / Symmetric-key algorithm / Initialization vector

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-03-23 10:23:39
13RC4 / Initialization vector / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Py

How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-01-22 11:51:20
14Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
15One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
16Electronic engineering / Cryptography / Television / Television technology / DVB-CPCM / Digital Video Broadcasting / Block cipher modes of operation / DVB-C / Initialization vector / DVB / Broadcast engineering / MPEG

TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2011-02-18 09:44:13
17Internet protocols / Secure communication / IPsec / Initialization vector / Unmanned aerial vehicle / Advanced Encryption Standard / CCMP / Padding / Galois/Counter Mode / Cryptography / Cryptographic protocols / Block cipher modes of operation

PDF Document

Add to Reading List

Source URL: smaccmpilot.org

Language: English - Date: 2014-03-04 18:04:46
18Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
19Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
20Initialization vector / Symmetric-key algorithm / Stream cipher / Block size / Ciphertext / RC4 / Triple DES / Cipher / Crypto++ / Cryptography / Block cipher modes of operation / Block cipher

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44
UPDATE