Plaintext

Results: 367



#Item
201Block cipher modes of operation / Ciphertext indistinguishability / Chosen-plaintext attack / Ciphertext / Malleability / Cryptography / Espionage / Cyberwarfare

First Modes of Operation Workshop (October[removed]New Modes of Encryption - A Perspective and a Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:23:40
202Computer security / Cryptographic software / Data security / National security / Password / Information sensitivity / Encryption / Plaintext / Email / Security / Cryptography / Computing

Responsible Use of University Computing Resources Policy Document Data Classification and Handling (Safeguarding Sensitive and Confidential Information[removed]Purpose

Add to Reading List

Source URL: www.montclair.edu

Language: English - Date: 2014-08-13 14:56:28
203Plaintext-aware encryption / Malleability / Advantage / Block cipher modes of operation / Chosen-ciphertext attack / Ciphertext / Cryptography / Chosen-plaintext attack / Ciphertext indistinguishability

First Modes of Operation Workshop (October 2000): A Message Integrity in Symmetric Encryption Message-Int4.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:32:39
204Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
205Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
206Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
207Infant bed / Known-plaintext attack / Family / 110th United States Congress / Consumer Product Safety Commission / Consumer Product Safety Improvement Act

Microsoft Word - Cribs Q and A Supplement - Commission Cleared.doc

Add to Reading List

Source URL: www.state.tn.us

Language: English - Date: 2011-06-16 12:34:37
208RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:08
209Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-04-11 09:39:21
210Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
UPDATE