Initialization

Results: 404



#Item
101Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:05
102Computing / Radio-frequency identification / Internet standards / EPCglobal / Access control / IPv6 / Low-Level Reader Protocol / Dynamic Host Configuration Protocol / Technology / Security / Identifiers

1 2 Discovery, Configuration, and Initialization (DCI) 3

Add to Reading List

Source URL: www.gs1hk.org

Language: English - Date: 2011-04-27 00:38:33
103Computer programming / Initialization / C++ classes / Struct / Constructor / New / Reference / ALGOL 68 / Template / Software engineering / C++ / Computing

Initializer Lists — Alternative N2575=N2575=14

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2008-03-17 06:22:22
104Procedural programming languages / Cross-platform software / C programming language / Data types / C / Initialization / Pointer / Struct / ALGOL 68 / Software engineering / Computing / Computer programming

High Assurance Software John Launchbury CEO, Galois Inc A Personal View

Add to Reading List

Source URL: ulf.wiger.net

Language: English - Date: 2008-02-29 09:47:44
105IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
106Chosen-ciphertext attack / Pretty Good Privacy / Initialization vector / Encryption / Known-plaintext attack / Block cipher / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Cryptography / Public-key cryptography / Ciphertext

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG Kahil Jallad 14 ;

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
107Block cipher modes of operation / Block cipher / Cipher / Probabilistic encryption / RSA / Padding / Cryptography / Authenticated encryption / Initialization vector

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
108Linear feedback shift register / Turing / Advanced Encryption Standard / Py / RC4 / Initialization vector / Grain / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / SOBER

1 The Turing Stream Cipher November 30, 2002 Turing: a fast stream cipher

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 00:48:29
109Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
110C++ / C programming language / Sizeof / C / Struct / Pointer / Initialization / New / SQL / Computing / Software engineering / Computer programming

INTERNATIONAL STANDARD ISO/IEC 9899:1999 TECHNICAL CORRIGENDUM 2 PublishedINTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2005-03-23 17:55:33
UPDATE