Initialization vector

Results: 165



#Item
21Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
22Ciphertext / Block cipher modes of operation / Advantage / Network packet / Cipher / Cyberwarfare / Information / Applied mathematics / Cryptography / Transmission Control Protocol / Initialization vector

Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-07-22 20:05:52
23Block cipher modes of operation / Authenticated encryption / Ticket Granting Ticket / Initialization vector / Secure Shell / Chosen-plaintext attack / Ciphertext / Key distribution center / Chosen-ciphertext attack / Cryptography / Cyberwarfare / Kerberos

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
24Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 14:40:46
25Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
26Initialization vector / Weak key / Ciphertext / Encryption / Cryptography / Cryptanalysis / RC4

Introduction Office Encryption Principle of Cryptanalysis

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2009-10-28 10:48:05
27Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
28IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
29Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
30Block cipher modes of operation / Block cipher / Cipher / Probabilistic encryption / RSA / Padding / Cryptography / Authenticated encryption / Initialization vector

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
UPDATE