Padding

Results: 316



#Item
231

padding-left border-left margin-left

Add to Reading List

Source URL: little-boxes.de

- Date: 2012-01-17 14:38:16
    232Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

    Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2008-06-03 04:22:03
    233SHA-1 / MD5 / Search algorithms / Collision attack / Wang Xiaoyun / Hash function / Collision / Padding / Money supply / Cryptography / Cryptographic hash functions / Hashing

    Collision Search Attacks on SHA1 Xiaoyun Wang∗

    Add to Reading List

    Source URL: www.c4i.org

    Language: English - Date: 2006-12-02 03:56:23
    234Key encapsulation / Electronic commerce / ID-based encryption / Optimal asymmetric encryption padding / Key size / RSA / Symmetric-key algorithm / XTR / ID-based cryptography / Cryptography / Key management / Public-key cryptography

    SK-KEM : AN IDENTITY-BASED KEM M. BARBOSA, L. CHEN, Z. CHENG, M. CHIMLEY, A. DENT, P. FARSHIM, K. HARRISON, J. MALONE-LEE, N.P. SMART, AND F. VERCAUTEREN

    Add to Reading List

    Source URL: grouper.ieee.org

    Language: English - Date: 2008-04-27 09:53:36
    235Advantage / Chosen-ciphertext attack / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Plaintext-aware encryption / RSA / Feistel cipher / Ciphertext / Cryptography / Optimal asymmetric encryption padding / Semantic security

    RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2001-05-29 06:07:19
    236Cryptographic protocols / Cryptographic software / Electronic commerce / Datagram Transport Layer Security / Transport Layer Security / GnuTLS / OpenSSL / Padding / RSA / Cryptography / Internet protocols / Computing

    Plaintext-Recovery Attacks Against Datagram TLS Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2012-01-10 15:59:35
    237Fugue / Padding / Endianness / Block cipher modes of operation / Hash function / Bit array / ZPAQ / NIST hash function competition / Cryptography / Advanced Encryption Standard

    The Hash Function “Fugue 2.0” Shai Halevi

    Add to Reading List

    Source URL: researcher.watson.ibm.com

    Language: English - Date: 2012-04-03 14:49:38
    238SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

    The SHAvite-3 Hash Function Tweaked Version[removed]

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2009-11-23 10:40:19
    239Hashing / Padding / NIST hash function competition / Hash function / Crypt / Advanced Encryption Standard / Collision resistance / Merkle–Damgård construction / HAS-V / Cryptography / Cryptographic hash functions / Error detection and correction

    Orange Labs Issy-les-Moulineaux, France

    Add to Reading List

    Source URL: crypto.rd.francetelecom.com

    Language: English - Date: 2010-08-14 12:14:45
    240Chosen-ciphertext attack / Padding / RSA / Advantage / Random oracle / Block cipher / Ciphertext / Cipher / Stream cipher / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

    An OAEP Variant With a Tight Security Proof – Draft 1.0 Jakob Jonsson

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2002-03-18 14:07:36
    UPDATE