One-time pad

Results: 106



#Item
61Homomorphic encryption / XTR / One-time pad / Key encapsulation / Cryptography / Ciphertext indistinguishability / Learning with errors

Lattice Cryptography for the Internet Chris Peikert∗ February 17, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-18 17:10:47
62Cipher / Keystream / Block cipher / Playfair cipher / One-time pad / Cryptanalysis / Running key cipher / Block size / Gilbert Vernam / Cryptography / Stream ciphers / Substitution cipher

CHAPTER 5 Cryptography ZHQM ZMGM ZMFM

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:43
63Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
64Transposition cipher / Cryptanalysis / Caesar cipher / One-time pad / Stream cipher / Code / Index of cryptography articles / Classical cipher / Cryptography / Cipher / Substitution cipher

Notes on cryptography Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS

Add to Reading List

Source URL: www.maths.qmul.ac.uk

Language: English - Date: 2003-11-28 05:01:22
65Espionage / Applied mathematics / Quantum key distribution / Secure communication / One-time pad / Key distribution / Key management / Secure voice / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

October 14, 2010 Press Release Inauguration of the Tokyo QKD Network ~ Ultimate secure communication at the world’s highest bit rate on a metropolitan fiber network in Tokyo ~

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2014-02-17 01:20:19
66RC4 / Ciphertext / One-time pad / Block cipher / Cipher / Correlation attack / Gilbert Vernam / Running key cipher / Cryptanalysis / Cryptography / Stream ciphers / Keystream

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
67Cryptographic software / Cipher / Chosen-plaintext attack / Key / Cryptanalysis / RSA / One-time pad / Encryption / Digital signature / Cryptography / Public-key cryptography / Key management

Cryptography and Democracy (1) Cryptography and Democracy : Dilemmas of Freedom

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-02-10 14:04:59
68Deterministic encryption / RSA / Cipher / One-time pad / Encryption / Authenticated encryption / Ciphertext indistinguishability / Cramer–Shoup cryptosystem / Cryptography / Semantic security / Ciphertext stealing

CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-13 00:34:50
69Ciphertext stealing / Integrated Encryption Scheme / Cryptography / Cipher / One-time pad

CS255: Cryptography and Computer Security Winter 2014 Assignment #1 Due: Wednesday, Feb. 5, 2014, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-01-27 21:10:48
70Initialization vector / One-time pad / Ciphertext indistinguishability / Cryptography / Advantage / Binary tree

CS255: Introduction to Cryptography Winter 2014 Assignment #1: Solutions Answer 0. Let m0 be the message “attack at dawn”, m1 be the message “attack at dusk”, and c0 , c1 be

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-26 12:43:20
UPDATE