Padding

Results: 316



#Item
271Hashing / Public-key cryptography / Electronic commerce / Merkle–Damgård construction / Padding / MD5 / HMAC / Flickr / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2009-09-27 19:06:37
272Block cipher / Transport Layer Security / Stream cipher / Chosen-ciphertext attack / Cipher / Chosen-plaintext attack / RSA / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Padding

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
273Ciphertext indistinguishability / Paillier cryptosystem / Semantic security / Threshold cryptosystem / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / ElGamal encryption / RSA / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-05-19 13:27:55
274Ciphertext indistinguishability / Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Advantage / RSA / Ciphertext / Deterministic encryption / Cryptography / Optimal asymmetric encryption padding / Semantic security

PDF Document

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
275Semantic security / Block cipher modes of operation / Key Wrap / Advantage / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Initialization vector / Authenticated encryption

PDF Document

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:36
276NIST hash function competition / One-way compression function / Advanced Encryption Standard / Block cipher / Padding / GOST / Grøstl / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2008-10-24 02:19:12
277Cryptographic hash functions / Secret sharing / Advanced Encryption Standard / Reed–Solomon error correction / Padding / SHA-2 / Password / Cryptography / Cryptographic protocols / Cleversafe

PDF Document

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2011-01-11 11:43:15
278Electronic commerce / Internet protocols / Transport Layer Security / Chosen-ciphertext attack / Padding / RSA / Cipher suite / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Secure communication

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-31 07:23:16
279Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / RSA / Advantage / Optimal asymmetric encryption padding / Malleability / Diffie–Hellman problem / Ciphertext / Cryptography / Public-key cryptography / Semantic security

PDF Document

Add to Reading List

Source URL: knot.kaist.ac.kr

Language: English - Date: 2002-01-21 23:23:01
280Plaintext-aware encryption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Ciphertext / Advantage / Cipher / Paillier cryptosystem / Probabilistic encryption / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-04-21 13:28:03
UPDATE