Plaintext

Results: 367



#Item
11ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
12Cryptography / Deterministic encryption / Chosen-plaintext attack / Digital signature / Advantage / Attack model / Encryption / Block cipher / Search engine technology

Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs Rutgers University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2015-10-18 00:55:12
13Enigma machine / Brand / Brand management / Communication design / Graphic design / Marketing / Known-plaintext attack

brand eins Online Develop Montag, 15. September 2008

Add to Reading List

Source URL: www.brandeins.de

Language: English - Date: 2013-04-04 07:36:58
14Consumer organizations / Kids In Danger / U.S. Consumer Product Safety Commission / Boaz Keysar / Infant bed / Drowning / Consumer Product Safety Act / Known-plaintext attack

Survivor Channeling Grief Into Policy Change

Add to Reading List

Source URL: www.traumaf.org

Language: English - Date: 2006-01-16 17:34:46
15Cryptography / Wearable computers / Augmented reality / Display technology / Eyewear / Google Glass / Plaintext / Visual cryptography / Data Encryption Standard / Seiko Epson / RSA

Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices Sarah J. Andrabi Michael K. Reiter

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:51
16Cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Quantum information science / Ciphertext indistinguishability / Semantic security / Block cipher / Post-quantum cryptography / Quantum key distribution / Chosen-plaintext attack / Optimal asymmetric encryption padding

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
17

Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson Nagravision SA, Switzerland Abstract. We present a chosen-plaintext attack on KIST, a recently proposed encryption scheme based on splay trees. Our atta

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:48
    18Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

    Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

    Add to Reading List

    Source URL: password-hashing.net

    Language: English
    19

    SecretAgent® 6.0 Encryption Architecture Plaintext File(s) © Information Security Corp. All rights reserved

    Add to Reading List

    Source URL: www.infoseccorp.com.

    - Date: 2008-11-20 13:37:29
      20Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

      Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

      Add to Reading List

      Source URL: isi.jhu.edu

      Language: English - Date: 2016-03-21 17:23:50
      UPDATE