Plaintext

Results: 367



#Item
51Block cipher modes of operation / Authenticated encryption / Ticket Granting Ticket / Initialization vector / Secure Shell / Chosen-plaintext attack / Ciphertext / Key distribution center / Chosen-ciphertext attack / Cryptography / Cyberwarfare / Kerberos

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
52Subtitle / Known-plaintext attack / Technology / Media technology / Visual arts / Digital media / Subtitling / Digital cinema

PDF Document

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
53Security / Software testing / Computer network security / Public-key cryptography / Known-plaintext attack / Vulnerability / Pretty Good Privacy / Penetration test / Encryption / Computer security / Cryptography / Cyberwarfare

PDF Document

Add to Reading List

Source URL: leastauthority.com

Language: English - Date: 2015-02-23 10:28:04
54Cryptography / Keystroke logging / Ciphertext / Chosen-plaintext attack / Espionage / Cryptanalysis / Cryptology

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:31
55Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2012-10-14 17:28:33
56Technical communication / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / National Institute of Standards and Technology / HTML / XML / Plaintext / Uniform resource identifier / Computing / Computer security / Markup languages

Draft NISTIR 8058, Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-01 09:44:02
57Plain Old Documentation / Perl module / Implied warranty / POD / Warranty / Perl / Contract law / Computing

Perl versiondocumentation - Pod::Perldoc::ToText NAME Pod::Perldoc::ToText - let Perldoc render Pod as plaintext SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:54:42
58Ciphertext / Caesar cipher / Known-plaintext attack / Cryptanalysis / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 20, 2015 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-01-19 20:59:56
59Cyberwarfare / Computer security / Cryptography / Data security / National security / Laptop theft / Plaintext / Password / Data remanence / Security / Computing / Disk encryption

Information Protection via Environmental Data Tethers Matt Beaumont-Gay Kevin Eustice

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-03-19 13:30:59
60Plaintext / San Francisco International Airport / Laptop / United Kingdom / Transportation in California / California / Economy of the United Kingdom / Fraud / Serious Fraud Office

PDF Document

Add to Reading List

Source URL: www.sfo.gov.uk

Language: English - Date: 2012-05-09 10:54:55
UPDATE