Plaintext

Results: 367



#Item
281Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
282

SecretAgent® 6.0 Encryption Architecture Plaintext File(s) © [removed]Information Security Corp. All rights reserved

Add to Reading List

Source URL: www.infoseccorp.com

- Date: 2008-11-20 13:37:29
    283Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

    Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

    Add to Reading List

    Source URL: www.scienceandmathacademy.com

    Language: English - Date: 2013-06-10 13:55:15
    284Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

    PDF Document

    Add to Reading List

    Source URL: www.storage.jak-stik.ac.id

    Language: English - Date: 2000-03-07 12:00:00
    285Advantage / Chosen-ciphertext attack / Semantic security / Ciphertext / Chosen-plaintext attack / Cipher / ElGamal encryption / Cryptography / Public-key cryptography / Proxy re-encryption

    Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

    Add to Reading List

    Source URL: www.mysmu.edu

    Language: English - Date: 2008-12-07 02:49:54
    286RSA / Chosen-ciphertext attack / PKCS / Optimal asymmetric encryption padding / Padding / Adaptive chosen-ciphertext attack / Daniel Bleichenbacher / Plaintext-aware encryption / Ciphertext / Cryptography / Public-key cryptography / Electronic commerce

    PDF Document

    Add to Reading List

    Source URL: www.storage.jak-stik.ac.id

    Language: English - Date: 2000-03-07 12:00:00
    287Data security / Information security / National security / Plaintext / Public safety / Security / Computer security / Crime prevention

    Information Security Corporation

    Add to Reading List

    Source URL: www.infoseccorp.com

    Language: English - Date: 2008-05-30 19:34:15
    288Cryptographic software / Computer security / Information security / National security / Encryption / Plaintext / Public safety / Cryptography / Security / Data security

    Microsoft Word - pr-sa59.DOC

    Add to Reading List

    Source URL: www.infoseccorp.com

    Language: English - Date: 2005-07-26 15:45:20
    289Convertibles / Culture of Detroit /  Michigan / Ford Model T / Known-plaintext attack / Tin Lizzies / Transport / Private transport / Land transport

    The Buzz The official publication of The Dairyland Tin Lizzies January - February 2006 Volume 5 Number 4

    Add to Reading List

    Source URL: clubs.hemmings.com

    Language: English - Date: 2012-03-01 03:02:48
    290Cryptographic software / Cipher / Chosen-plaintext attack / Key / Cryptanalysis / RSA / One-time pad / Encryption / Digital signature / Cryptography / Public-key cryptography / Key management

    Cryptography and Democracy (1) Cryptography and Democracy : Dilemmas of Freedom

    Add to Reading List

    Source URL: www.cyber-rights.org

    Language: English - Date: 1999-02-10 14:04:59
    UPDATE