Plaintext

Results: 367



#Item
271Advanced Encryption Standard / Cryptanalysis / Ciphertext-only attack / Ciphertext / Boomerang attack / Chosen-plaintext attack / Cipher / Data Encryption Standard / Serpent / Cryptography / Espionage / Differential cryptanalysis

Retro Cryptography „ What can YOU do with 1 Known Plaintext?

Add to Reading List

Source URL: www.spms.ntu.edu.sg

Language: English - Date: 2010-12-07 00:14:22
272Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
273Ciphertext / Caesar cipher / Known-plaintext attack / Cipher / Cryptanalysis / Chosen-plaintext attack / Four-square cipher / Cryptography / Stream ciphers / Vigenère cipher

Vigenere Cipher in Lisp gene m. stover created Tuesday, 2004 August 3 updated Monday, 2006 April 17 Copyright copyright 2004, 2006 Gene Michael Stover. All rights reserved. Permission to copy, store, & view this document

Add to Reading List

Source URL: cybertiggyr.com

Language: English - Date: 2014-06-08 02:17:23
274Shōnen manga / Hideo Azuma / Yamato Transport / Anime / Anime series / Japan

Proofs of Plaintext Knowledge for the Regev Cryptosystems 草川恵太/河内亮周/田中圭介/東京工業大学 お詫び 2

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:50:58
275Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Chosen-plaintext attack / Ciphertext / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
276Ciphertext / Chosen-plaintext attack / Block cipher / Linear cryptanalysis / Maximum likelihood / Likelihood function / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

LIKELIHOOD ESTIMATION FOR BLOCK CIPHER KEYS Sean Murphy, Fred Piper, Michael Walker(y), Peter Wild Information Security Group (y)Vodafone Limited Royal Holloway The Courtyard

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:16
277Ciphertext / Maximum likelihood / Chosen-plaintext attack / Differential cryptanalysis / Likelihood function / Block cipher / Normal distribution / Keystream / Four-square cipher / Cryptography / Estimation theory / Stream ciphers

Likelihood Estimation for Block Cipher Keys Sean Murphy, Fred Piper, Michael Walker and Peter Wild Technical Report RHUL–MA–2006–3

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-07-06 07:56:42
278Block cipher / ICE / Ciphertext / Chosen-plaintext attack / Differential cryptanalysis / Classical cipher / Cryptography / Data Encryption Standard / Cryptanalysis

June 14, [removed]Markov Ciphers and

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:38:20
279Symmetric-key algorithm / Cipher / LORAN / Key / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: waas.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
280Chosen-plaintext attack / Lossless data compression / Ciphertext / Data compression / Plaintext / Advanced Encryption Standard / Known-plaintext attack / Cipher / Cryptanalysis / Cryptography / Espionage / Cyberwarfare

Compression and Information Leakage of Plaintext John Kelsey, Certicom ([removed]) 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
UPDATE