Plaintext

Results: 367



#Item
151Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
152Computer security / Crime prevention / National security / Computer network security / Information security / Encryption / Data Encryption Standard / Vulnerability / Plaintext / Security / Cryptography / Cyberwarfare

qry_Cyber Fund_Glossary 21May2014.xlsx

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2014-06-16 15:34:24
153Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
154ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
155Encryption / Plaintext / Health Insurance Portability and Accountability Act / Information privacy / Computing / Law / Computer security / Cryptography / Concentra / Laptop

Beazley Insight The Case of the $1.7 Million Laptop by Sue Yi www.beazley.com/tmb

Add to Reading List

Source URL: www.beazley.com

Language: English - Date: 2015-01-17 21:06:11
156Classical cipher / Known-plaintext attack / Vigenère cipher / Alberti cipher disk / Cryptography / Cipher / Substitution cipher

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
157Classical cipher / Known-plaintext attack / Vigenère cipher / Alberti cipher disk / Cryptography / Cipher / Substitution cipher

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
158In re Boucher / Law / Fifth Amendment to the United States Constitution / Encryption / Subpoena duces tecum / Plaintext / Cryptographic software / Key disclosure law / Pretty Good Privacy / Disk encryption / Cryptography / Digital forensics

Forced Data Decryption: Does It Violate the Fifth Amendment?

Add to Reading List

Source URL: www.crowell.com

Language: English - Date: 2013-02-15 15:21:03
159Child safety / Infant bed / Known-plaintext attack / Family / Infancy / Babycare / Beds

Division of Children and Family Services P.O. Box 1437, Slot S-560 · Little Rock, AR[removed][removed] · Fax: [removed] · TDD: [removed]January 28, 2011

Add to Reading List

Source URL: www.fosterarkansas.org

Language: English - Date: 2011-02-16 16:02:38
160Malware / Ransomware / Advanced Encryption Standard / Antivirus software / Encryption software / ANts P2P / Public-key cryptography / Known-plaintext attack / Cryptography / Cryptographic software / Extortion

Report Understanding Crypto-Ransomware In-Depth Analysis of the Most Popular Malware Families

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2014-12-18 20:37:23
UPDATE