Symmetric-key cryptography

Results: 367



#Item
91Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
92Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39
93Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
94Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
95ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
96Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:33:23
97Applied mathematics / Information theory / Information / Public-key cryptography / Cybernetics / List decoding / Binary symmetric channel / Key size / RSA / Coding theory / Error detection and correction / Mathematics

A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-06 12:25:19
98Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
99Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE

Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:13
100Cipher / Symmetric-key algorithm / Digital signature / Commitment scheme / Key generation / Key size / Key / RSA / Initialization vector / Cryptography / Key management / Public-key cryptography

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
UPDATE