Padding

Results: 316



#Item
41

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 3

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    42

    Characterization of Padding Rules and Different Variants of MD Hash Functions Mridul Nandi National Institute of Standards and Technology

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      43Internet Standards / Internet protocols / Internet security / Secure communication / Dark web / Tor / Transmission Control Protocol / Internet privacy / Internet Relay Chat / Padding

      Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

      Add to Reading List

      Source URL: securehomes.esat.kuleuven.be

      Language: English - Date: 2014-04-22 05:29:47
      44Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

      Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

      Add to Reading List

      Source URL: tls.mbed.org

      Language: English - Date: 2016-01-19 07:39:30
      45Cryptography / Deterministic encryption / Encryption / Hash function / Bloom filter / Padding / Key

      raykova.ccsw_sads [Compatibility Mode]

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-11-28 04:00:03
      46

      2013 NEW PRODUCTS TRAINING GEAR Groin Protection The fully adjustable Groin Protecting accessory from Force On Force™ features tough, contoured-sewn padding to provide protection without restricting movement. It’s ru

      Add to Reading List

      Source URL: www.forceonforce.com

      - Date: 2015-06-25 18:57:16
        47

        Padding and fragmentation for masking packet length statistics Alfonso Iacovazzi and Andrea Baiocchi Dept. of Information Engineering, Electronics and Telecommunications (DIET), University of Roma Sapienza, Via Eudossian

        Add to Reading List

        Source URL: tma2012.ftw.at

        Language: English
          48Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

          A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

          Add to Reading List

          Source URL: jda.noekeon.org

          Language: English - Date: 2013-08-28 07:53:26
          49

          714 Latex Carpet Pad Adhesive DESCRIPTION APAC 714 is specially formulated for quick bonding of most types of carpet padding to subfloors in stretch-in carpet installations. APAC 714

          Add to Reading List

          Source URL: www.apacadhesives.com

          Language: English - Date: 2011-01-05 14:47:51
            50

            OAEP 3-Round A Generic and Secure Asymmetric Encryption Padding Duong Hieu Phan and David Pointcheval ´ Ecole

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2007-09-06 02:11:50
              UPDATE