Padding

Results: 316



#Item
91Block cipher modes of operation / Block cipher / Cipher / Probabilistic encryption / RSA / Padding / Cryptography / Authenticated encryption / Initialization vector

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
92Federalism / Gökhan Birben / Levent Yüksel

CSS Shorthand Cheat Sheet by Example leigeber.com Margin & Padding #div {

Add to Reading List

Source URL: www.scriptiny.com

Language: English - Date: 2013-05-18 13:47:37
93Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
94Padding / Collision attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

Semi-free start collision attack on Blender

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 20:38:01
95Hashing / SHA-2 / SHA-1 / Secure Hash Standard / HMAC / Crypt / Hash function / Padding / NSA Suite B Cryptography / Error detection and correction / Cryptographic hash functions / Cryptography

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
96Optimal asymmetric encryption padding / Claw-free permutation / Combinatorics / One-way function / Advantage / Random oracle / Parity of a permutation / Trapdoor function / Full Domain Hash / Cryptography / Permutations / Cryptographic hash functions

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 12:09:46
97RSA / Advantage / XTR / Random oracle / Probabilistic encryption / Cryptography / Optimal asymmetric encryption padding / Ciphertext indistinguishability

Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-03 12:04:07
98Electronic commerce / MD5 / Hashing / Collision attack / X.509 / SHA-1 / Padding / Collision / Preimage attack / Cryptography / Public-key cryptography / Cryptographic hash functions

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
99Paillier cryptosystem / Commitment scheme / Advantage / RSA / Semantic security / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

On definitions of selective opening security Florian B¨ohl∗, Dennis Hofheinz†, and Daniel Kraschewski Karlsruhe Institute of Technology {Florian.Boehl,Dennis.Hofheinz,Daniel.Kraschewski}@kit.edu October 29, 2013

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-29 07:48:46
100X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-01 09:05:12
UPDATE