Known-plaintext attack

Results: 101



#Item
31Security / Passphrase / Chosen-plaintext attack / Chosen-ciphertext attack / Crypt / Ciphertext / Key / Secure Shell / Known-plaintext attack / Cryptography / Espionage / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:33
32Initialization vector / Stream cipher / RC4 / Block cipher / Cryptanalysis / One-time pad / Known-plaintext attack / Block cipher modes of operation / Plaintext-aware encryption / Cryptography / Chosen-plaintext attack / Ciphertext

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
33Espionage / Security / Ciphertext indistinguishability / Ciphertext / RSA / Cipher / Known-plaintext attack / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Public-key cryptography / Cyberwarfare

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
34Beds / Mattress / Infant bed / Bed sheet / Playpen / Known-plaintext attack / Home / Bedding / Child safety

Page TWO Child Care Licensing 160 East Kellogg Blvd St Paul, MN 55101 651[removed]

Add to Reading List

Source URL: co.ramsey.mn.us

Language: English - Date: 2015-02-02 03:02:11
35Beds / Mattress / Furniture / Infant bed / Bed sheet / Playpen / Known-plaintext attack / Home / Bedding / Child safety

Child Care Licensing 160 East Kellogg Blvd St Paul, MN[removed]3781 Crib Compliance Documentation Form

Add to Reading List

Source URL: co.ramsey.mn.us

Language: English - Date: 2015-02-02 03:02:11
36Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
37Classical cipher / Known-plaintext attack / Vigenère cipher / Alberti cipher disk / Cryptography / Cipher / Substitution cipher

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
38Classical cipher / Known-plaintext attack / Vigenère cipher / Alberti cipher disk / Cryptography / Cipher / Substitution cipher

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
39Child safety / Infant bed / Known-plaintext attack / Family / Infancy / Babycare / Beds

Division of Children and Family Services P.O. Box 1437, Slot S-560 · Little Rock, AR[removed][removed] · Fax: [removed] · TDD: [removed]January 28, 2011

Add to Reading List

Source URL: www.fosterarkansas.org

Language: English - Date: 2011-02-16 16:02:38
40Malware / Ransomware / Advanced Encryption Standard / Antivirus software / Encryption software / ANts P2P / Public-key cryptography / Known-plaintext attack / Cryptography / Cryptographic software / Extortion

Report Understanding Crypto-Ransomware In-Depth Analysis of the Most Popular Malware Families

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2014-12-18 20:37:23
UPDATE