Padding

Results: 316



#Item
101ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
102Cryptography / Padding / Block cipher

Introduction Finding Padding Oracles Basic PO attacks Advanced PO attacks Summary

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:29
103Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
104Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
105Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
106

POODLE - krytyczna podatność SSLv3 Badacze z firmy Google udostępnili informację o ataku na protokół SSLv3 nazwanym POODLE - Padding Oracle On Downgraded Legacy Encryption. Atak jest skierowany przeciwko szyfrom wy

Add to Reading List

Source URL: www.cert.gov.pl

Language: Polish - Date: 2015-04-20 00:06:20
    107Ciphertext / Initialization vector / Public-key cryptography / Mix network / RSA / Cipher / Padding / Block cipher / Anonymous remailer / Cryptography / Mixminion / Onion routing

    Minx: A Simple and Efficient Anonymous Packet Format George Danezis Ben Laurie University of Cambridge, Computer Laboratory,

    Add to Reading List

    Source URL: apache-ssl.securehost.com

    Language: English - Date: 2009-01-02 13:32:39
    108RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

    CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-11 11:47:35
    109One-way function / Cryptographic hash function / Commitment scheme / Padding / Digital signature / Cryptography / XTR / RSA

    CS255: Cryptography and Computer Security Winter 2015 Assignment #3 Due: Friday, Mar. 13, 2015, by 5pm.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-07 13:28:44
    UPDATE