Plaintext

Results: 367



#Item
111Chosen-plaintext attack / Cipher / Block cipher / RSA / DES-X / Ciphertext indistinguishability / Malleability / Cryptography / Ciphertext / One-time pad

CS255: Cryptography and Computer Security Winter 2000 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-01-11 23:12:09
112Cipher / Block cipher / Stream cipher / One-time pad / RSA / Vigenère cipher / Triple DES / Cryptography / Ciphertext / Chosen-plaintext attack

CS255: Cryptography and Computer Security Winter 2007 Assignment #1 Due: Wednesday, Jan. 31st, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-24 01:30:06
113Cipher / RSA / Key / Chosen-plaintext attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext

A talk in 32 parts Onion Misc Examples

Add to Reading List

Source URL: www.linuxsa.org.au

Language: English - Date: 2011-08-14 22:08:52
114Block cipher / Chosen-plaintext attack / One-time pad / Cipher / Ciphertext stealing / Vigenère cipher / Cryptography / Stream ciphers / Ciphertext

CS255: Cryptography and Computer Security Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-18 19:58:02
115Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
116Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
117Block cipher / Chosen-plaintext attack / Plaintext / Known-plaintext attack / Crypt / Ciphertext / Cipher / ICE / Data Encryption Standard / Cryptography / Format-preserving encryption / Advanced Encryption Standard

Analysis of VAES3 (FF2) Morris Dworkin Ray Perlner National Institute of Standards and Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 13:14:10
118MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
119Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
120KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
UPDATE