Padding

Results: 316



#Item
141JavaServer Faces / Java specification requests / Java platform / Apache MyFaces / Java Platform /  Enterprise Edition / ASP.NET / Java Servlet / Padding oracle attack / Jspx-bay / Computing / Web application frameworks / Java enterprise platform

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
142Cryptography standards / Internet standards / Secure communication / RSA / PKCS / Transport Layer Security / Padding / Chosen-ciphertext attack / Key size / Cryptography / Public-key cryptography / Electronic commerce

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma♣, Ondřej Pokorný1 and Tomáš Rosa2,♣ 2 1 ICZ, Prague, Czech Republic Dept. of Computer Science and Eng., FEE, Czech Technical University in Prague

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-29 14:13:55
143HaAh HaGadol 4 / Debbagh / Surnames / Christianity

GoSquared Syntax CSS Help Sheet Margins + Padding

Add to Reading List

Source URL: media.mediatemple.netdna-cdn.com

Language: English - Date: 2011-06-01 11:10:20
144Optimal asymmetric encryption padding / Advantage / Block cipher / ICE

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction∗ Jean-Sébastien Coron University of Luxembourg [removed]

Add to Reading List

Source URL: www.jscoron.fr

Language: English - Date: 2015-04-03 04:14:18
145Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
146Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
147

Evaluation of various padding materials for crash protection

Add to Reading List

Source URL: www.faa.gov

- Date: 2012-05-31 15:24:13
    148Modular arithmetic / Finite fields / Number theory / XTR / RSA / Quadratic residue / Abstract algebra / Mathematics / Ring theory

    On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption Adam Smith∗ Ye Zhang∗

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-01-12 20:10:40
    149PKCS / Abstract Syntax Notation One / Octet / Padding / RSA / Cryptographic hash function / Ip / Basic Encoding Rules / Cryptography / Cryptography standards / Public-key cryptography

    Intel Security: Advanced Threat Research BERserk Vulnerability Part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5 September 29, 2014

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2014-09-30 12:40:24
    150Calendar / Year / Calendars / Academic term / PowerSchool

    Padding Calendars in PowerSchool  Monday, November 10, 2014    As a reminder, schools are not to pad their Years and Terms’ start and end dates in PowerSchool. The  dates of the Years an

    Add to Reading List

    Source URL: www.nc-sis.org

    Language: English - Date: 2014-11-26 11:44:35
    UPDATE