Plaintext

Results: 367



#Item
301Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

Add to Reading List

Source URL: www.math.huji.ac.il

Language: English - Date: 2010-09-02 14:16:20
302XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
303Cipher / Floradora / Code / Known-plaintext attack / Cryptanalysis / One-time pad / Cryptography / Espionage / Cyberwarfare

How the Allies broke the German Diplomatic cipher Floradora. During World War 2, the Germans believed their two major diplomatic cryptographic systems were impregnable. Both were based on a

Add to Reading List

Source URL: www.cryptoden.com

Language: English - Date: 2012-08-05 04:37:06
304Biuro Szyfrów / Military intelligence / Ultra / Enigma machine / Bomba / Known-plaintext attack / Bombe / Zygalski sheets / Alan Turing / Cryptography / Espionage / Bletchley Park

The Influence of ULTRA in the Second World War [ Changed 26th November[removed]Last year Sir Harry Hinsley kindly agreed to speak about Bletchley Park, where he worked during the

Add to Reading List

Source URL: www.cdpa.co.uk

Language: English - Date: 2008-02-11 06:08:56
305IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
306Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
307Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
308Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
309Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
310Security / Computing / Data security / Encryption / USB flash drive / Information security / Filesystem-level encryption / Plaintext / Disk encryption hardware / Disk encryption / Cryptography / Cryptographic software

Guide to Storage Encryption for End User Devices

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2013-10-26 23:11:03
UPDATE