Plaintext

Results: 367



#Item
101Cryptography / Security / Electronics / Laptop / Data security / Plaintext / Encryption / Information security / USB flash drive / Computing / Classes of computers / Personal computing

Policy for Information Security on laptops and portable media Policy for Information Security on laptops and portable media Document Control File Name

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-05-22 07:19:12
102Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
103Science / Statistics / Computational linguistics / Automatic summarization / Data mining / Beer rating / Sentiment analysis / Semi-supervised learning / Grammatical aspect / Machine learning / Artificial intelligence / Natural language processing

Learning Attitudes and Attributes from Multi-Aspect Reviews Julian McAuley, Jure Leskovec, Dan Jurafsky Stanford Abstract—The majority of online reviews consist of plaintext feedback together with a single numeric scor

Add to Reading List

Source URL: nlp.stanford.edu

Language: English - Date: 2012-10-22 11:32:11
104Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
105Initialization vector / Known-plaintext attack / Stream cipher / Ciphertext / Cipher / Chosen-plaintext attack / Wireless Transport Layer Security / Transport Layer Security / Cryptography / Espionage / Cyberwarfare

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38
106Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
107Block cipher / RSA / Chosen-plaintext attack / Ciphertext stealing / Triple DES / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2006 Assignment #1 Due: Wednesday, Feb. 1st, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-26 14:21:46
108Stream cipher / Chosen-plaintext attack / Block cipher / One-time pad / Cipher / RSA / Ciphertext indistinguishability / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

CS255: Cryptography and Computer Security Winter 2004 Assignment #1 Due: Wednesday, Jan. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-20 16:42:25
109Stream ciphers / Ciphertext / RSA / One-time pad / Chosen-plaintext attack / Block cipher / Cipher / Paillier cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2001 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-01-25 15:17:18
110One-time pad / Chosen-plaintext attack / Cipher / RSA / Triple DES / Key clustering / Cryptography / Ciphertext / Block cipher

CS255: Cryptography and Computer Security Winter 2003 Assignment #1 Due: Wednesday, February 5th, 2003. In class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-27 01:54:54
UPDATE