Padding

Results: 316



#Item
71Internet protocols / Secure communication / IPsec / Initialization vector / Unmanned aerial vehicle / Advanced Encryption Standard / CCMP / Padding / Galois/Counter Mode / Cryptography / Cryptographic protocols / Block cipher modes of operation

PDF Document

Add to Reading List

Source URL: smaccmpilot.org

Language: English - Date: 2014-03-04 18:04:46
72Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
73MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
74One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
75Hashing / MD5 / Search algorithms / Collision attack / Padding / X.509 / Hash function / RSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
76X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-03-01 03:48:44
77MD5 / Padding / SHA-1 / RSA / Abstract Syntax Notation One / Cryptography / Cryptographic hash functions / Public-key cryptography

TargetCollidingCertificatesTech

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-10-26 18:40:33
78Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
79Government procurement / Business / Sustainable procurement / Ecolabel / Sustainable products / Government procurement in the European Union / Procurement / E-procurement / Forward Commitment Procurement / Environment / Sustainability / Environmental economics

100%? Six years of sustainable procurement in the Netherlands Take Padding 1

Add to Reading List

Source URL: www.pianoo.nl

Language: English - Date: 2012-09-19 06:57:55
80Public-key cryptography / Internet protocols / Electronic commerce / Adaptive chosen-ciphertext attack / Transport Layer Security / Daniel Bleichenbacher / RSA / Padding / HTTP Secure / Cryptography / Secure communication / Cryptographic protocols

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-10 20:13:35
UPDATE