Plaintext

Results: 367



#Item
41One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
42Key size / Cryptanalysis / Plaintext / COSIC / Encryption / Public-key cryptography / Advanced Encryption Standard / Py / Computer security / Cryptography / National Security Agency / Communications security

Microsoft PowerPoint - preneel_wroclaw_oct14_v1.pptx

Add to Reading List

Source URL: www.informatics-europe.org

Language: English - Date: 2014-10-23 03:39:46
43Substitution cipher / Cipher / Known-plaintext attack / Frequency analysis / Affine cipher / Classical cipher / Cryptography / ROT13 / Caesar cipher

Intro to Cryptography: Define: plaintext ciphertext encryption function decryption function

Add to Reading List

Source URL: betweenthenumbers.files.wordpress.com

Language: English - Date: 2015-03-22 21:36:56
44Technology / Transport / Known-plaintext attack / Tanker / Flexible intermediate bulk container

J-CRIB Pumpable Crib ® J-CRIB® is a specialized pumpable cement and containment bag that replaces conventional timber cribs in longwall tailgates and bleeder headings. The

Add to Reading List

Source URL: www.jennmar.com

Language: English - Date: 2014-08-28 14:36:59
45Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
46Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
47Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
48Alan Turing / Turing machine / Colossus computer / Bombe / Enigma machine / Lorenz cipher / Gordon Welchman / Known-plaintext attack / Cryptanalysis / Cryptography / Espionage / Bletchley Park

FEATURE ALAN TURING, COLOSSUS, AND TURING MACHINES We’re taking a break from our Olde Code series this issue to get some background on a man who was in the news as recently as last year. Juliet Kemp looks back at the

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-02-09 09:27:27
49Child safety / Babycare / Infant bed / Mattress / Nursery / Infant / Family / Known-plaintext attack / Architecture / Infancy / Beds / Home

TIPP: Infant Furniture: Cribs

Add to Reading List

Source URL: www.pediatricspec.com

Language: English - Date: 2013-12-19 11:35:46
50Cipher / Block cipher / Stream cipher / Substitution cipher / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Symmetric-key algorithm / Ciphertext

Searching Encrypted Data Project Report William Harrower 〈〉 Department of Computing

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-07-27 09:04:16
UPDATE