Chosen-plaintext attack

Results: 179



#Item
131Cryptography and Democracy  (1) Cryptography and Democracy : Dilemmas of Freedom

Cryptography and Democracy (1) Cryptography and Democracy : Dilemmas of Freedom

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-02-10 14:04:59
132CS255: Cryptography and Computer Security  Winter 2011 Final Exam Instructions:

CS255: Cryptography and Computer Security Winter 2011 Final Exam Instructions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-29 15:51:55
133Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:21:59
134Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
135Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman1,2 , Nathan Keller2 , and Adi Shamir2

Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman1,2 , Nathan Keller2 , and Adi Shamir2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-10-02 05:38:38
136RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

RSA–OAEP is Secure under the RSA Assumption Eiichiro Fujisaki and Tatsuaki Okamoto

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-05-29 06:07:19
137A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

Add to Reading List

Source URL: www.csshl.net

Language: English - Date: 2011-10-26 10:07:40
138OWN33 Powers of t 0

OWN33 Powers of t 0

Add to Reading List

Source URL: cs.jhu.edu

Language: English - Date: 2008-11-17 00:24:59
139New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

Add to Reading List

Source URL: www.math.huji.ac.il

Language: English - Date: 2010-09-02 14:16:20
140Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English