Padding

Results: 316



#Item
21Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
22Packaging / Containers / Paper / Cushioning / Packaging and labeling / Carton / Padding

Perfect Protective Packaging Perfect Protective Packaging PAPERplus® - paper padding for perfect protective packaging

Add to Reading List

Source URL: www.storopack.com

Language: English - Date: 2016-06-28 02:47:15
23Fourier analysis / Convolution / Discrete Fourier transform / Multidimensional discrete convolution / Fourier transform / Circular convolution / Fourier series / Spectral method / Discrete Hartley transform / SchnhageStrassen algorithm

EFFICIENT DEALIASED CONVOLUTIONS WITHOUT PADDING∗ JOHN C. BOWMAN† AND MALCOLM ROBERTS† SIAM J. Sci. Comput., 33:1, Abstract. Algorithms are developed for calculating dealiased linear convolution sums

Add to Reading List

Source URL: www.math.ualberta.ca

Language: English - Date: 2016-02-21 19:03:42
24Transport Layer Security / Secure communication / Cryptography / E-commerce / Cryptographic protocols / DROWN attack / Padding oracle attack / OpenSSL / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Padding

Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

Add to Reading List

Source URL: drownattack.com

Language: English - Date: 2016-07-01 21:14:30
25Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
26Cryptography / Disk encryption / Block cipher mode of operation / Block cipher / Padding / Advanced Encryption Standard / RSA / Key Wrap / Encryption / Cipher / Data Encryption Standard / Disk encryption theory

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2012-11-01 12:03:04
27Furniture / Upholstery / Couch

scandinavia scandinavia Scandinavia is a wonderful and relaxing seat, thanks to its extra soft padding. The cushions can be turned over and the upholstery is removable, even from the frame. The design is simple, natura

Add to Reading List

Source URL: www.kinnarps.lt

Language: English - Date: 2014-10-07 07:43:42
28Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / IPsec / Ping / Authenticated encryption / Network packet / Security Parameter Index / IPv4 / Transmission Control Protocol / Padding

On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-12-10 09:12:20
29Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
30Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05
UPDATE