Padding

Results: 316



#Item
81Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
82Traffic analysis / Email / Padding / RSA / Internet Relay Chat flood / Degree of anonymity / Cryptography / Public-key cryptography / Mixminion

Practical Traffic Analysis: Extending and Resisting Statistical Disclosure Nick Mathewson and Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2004-07-02 20:55:24
83Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
84HaAh HaGadol 4 / Debbagh / Surnames / Christianity

GoSquared Syntax CSS Help Sheet Margins + Padding

Add to Reading List

Source URL: downloads.gosquared.com

Language: English - Date: 2010-05-12 17:45:35
85Chosen-ciphertext attack / Ciphertext indistinguishability / Malleability / RSA / Ciphertext / Chosen-plaintext attack / Random oracle / Cipher / Cramer–Shoup cryptosystem / Cryptography / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
86Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
87Block cipher / Stream cipher / Chosen-ciphertext attack / Cipher / Chosen-plaintext attack / Transport Layer Security / RSA / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Padding

Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-30 18:34:48
88Key management / SAFER / Padding / Slide attack / Weak key / Key schedule / Crypt / ICE / SXAL/MBAL / Cryptography / Block ciphers / Advanced Encryption Standard

Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
89Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
90Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE