Padding

Results: 316



#Item
251Block cipher / Cryptanalysis / Symmetric-key algorithm / Cipher / One-time pad / Padding / Index of cryptography articles / FEAL / Cryptography / Differential cryptanalysis / Eli Biham

Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti

Add to Reading List

Source URL: webcourse.cs.technion.ac.il

Language: English - Date: 2006-11-05 09:06:55
252RSA / Strong RSA assumption / Optimal asymmetric encryption padding / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Cipher / Plaintext-aware encryption / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / RSA problem

RSA Problem Ronald L. Rivest, MIT Laboratory for Computer Science [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2003-12-18 14:24:00
253Known-plaintext attack / Cyclic redundancy check / Ciphertext / Py / XOR cipher / Block cipher modes of operation / Padding / Stream ciphers / Cryptography / Completeness

ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

Add to Reading List

Source URL: math.ucr.edu

Language: English - Date: 2006-03-09 16:25:49
254/dev/random / Random number generation / Cryptographic hash function / Entropy / Padding / Fortuna / Pseudorandomness / Key / MD5 / Cryptography / Randomness / Pseudorandom number generators

Software Generation of Practically Strong Random Numbers Peter Gutmann Department of Computer Science

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 1998-02-12 15:33:43
255Adaptive chosen-ciphertext attack / Probabilistic encryption / Plaintext-aware encryption / Malleability / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / Deterministic encryption / Advantage / Cryptography / Optimal asymmetric encryption padding / Semantic security

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
256Preimage attack / MD5 / Hash function / SHA-1 / Collision attack / Padding / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
257Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
258MD5 / Hashing / Collision attack / SHA-1 / MD4 / Hash function / Collision resistance / Padding / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Eindhoven University of Technology Department of Mathematics and Computing Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-07-05 06:20:54
259Electronic commerce / RSA / Key management / Optimal asymmetric encryption padding / PKCS1 / Key size / Block cipher / PKCS / Ø / Cryptography / Public-key cryptography / Cryptography standards

The RSA one way permutation Ø

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-09 14:25:34
260Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
UPDATE