Vector Security

Results: 220



#Item
211RSA / Fault injection / Probabilistic encryption / Advanced Encryption Standard / Paillier cryptosystem / Side channel attack / Computer security / Initialization vector / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Fault Diagnosis and Tolerance in Cryptography, Santa Barbara : United States (2010)" DOI : [removed]FDTC[removed]

Add to Reading List

Source URL: hal.archives-ouvertes.fr

Language: English - Date: 2010-11-11 06:25:51
212Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Monitor mode / Cryptography / Wireless networking / Computer network security

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:45:01
213Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
214Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: n-pn.info

Language: English - Date: 2011-11-21 22:49:00
215Public-key cryptography / Electronic commerce / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / RSA / Integrated Encryption Scheme / Cryptography / Block cipher modes of operation / Ciphertext stealing

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
216IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
217Classified information / Data security / Sanitization / Technical communication tools / Adobe Systems / Vector graphics / Adobe Acrobat / Portable Document Format / Redaction / Software / Computing / Information science

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-11-23 10:33:55
218Semantic security / Block cipher modes of operation / Key Wrap / Advantage / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Initialization vector / Authenticated encryption

PDF Document

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:18:36
219Data analysis / Anomaly detection / Data security / Outlier / Local outlier factor / RANSAC / K-nearest neighbor algorithm / Support vector machine / Statistics / Data mining / Robust statistics

PDF Document

Add to Reading List

Source URL: axon.cs.byu.edu

Language: English - Date: 2011-04-19 15:46:19
220Computer network security / Stream ciphers / Wireless networking / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-09-16 14:46:25
UPDATE