Plaintext

Results: 367



#Item
21

Tooling Updates Grammarkdown (Grmd) • https://github.com/rbuckton/grammarkdown • Plaintext syntax for specifying ECMAScript grammar • Support for multiple emitters – MD, html, emu

Add to Reading List

Source URL: esdiscuss.org

Language: English
    22Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

    Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-12-11 07:25:27
    23Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

    On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-06-25 11:49:37
    24Alan Turing / Cryptography / Turing machine / Computability theory / Models of computation / Codebreaker / Public-key cryptography / Known-plaintext attack / Cipher / Turing / Encryption / Cryptanalysis

    ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

    Add to Reading List

    Source URL: www.cs4fn.org

    Language: English - Date: 2012-11-21 11:20:28
    25

    Low-Overhead User Data Protection for Smartphones using Plaintext Cache Jung-Sang Ahn∗ and Seungryoul Maeng† KAIST, Daejeon, South Korea {jsahn∗ , maeng† }@camars.kaist.ac.kr Abstract—This paper proposes a cos

    Add to Reading List

    Source URL: www.mostconf.org

    Language: English - Date: 2013-04-18 16:43:22
      26

      Deobfuscating Embedded Malware using Probable-Plaintext Attacks Christian Wressnegger1,2 , Frank Boldewin3 , and Konrad Rieck2 2 1

      Add to Reading List

      Source URL: user.informatik.uni-goettingen.de

      Language: English - Date: 2015-02-14 07:53:32
        27

        This paper appears in Orr Dunkelman, editor, CT-RSA 2012, Springer-Verlag LNCS 7178, 332–348, Plaintext-Checkable Encryption S´ebastien Canard1 , Georg Fuchsbauer2 , Aline Gouget3 , and Fabien Laguillaumie4 1

        Add to Reading List

        Source URL: www.di.ens.fr

        Language: English - Date: 2012-04-02 11:25:19
          28

          How To Securely Release Unverified Plaintext in Authenticated EncryptionElena Andreeva Andrey Bogdanov Atul Luykx Bart Mennink Nicky Mouha Kan Yasuda

          Add to Reading List

          Source URL: des.cse.nsysu.edu.tw

          Language: English - Date: 2014-12-07 10:05:14
            29Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

            Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

            Add to Reading List

            Source URL: www.rocq.inria.fr

            Language: English - Date: 2006-03-23 08:13:04
            UPDATE