Initialization vector

Results: 165



#Item
11This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
12The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2  Haibin Zhang1

The Security of Ciphertext Stealing Phillip Rogaway1 Mark Wooding2 Haibin Zhang1

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-03-23 10:23:39
13How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-01-22 11:51:20
14U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
15CS 161  Computer Security Spring 2010

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
16TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2011-02-18 09:44:13
17

PDF Document

Add to Reading List

Source URL: smaccmpilot.org

Language: English - Date: 2014-03-04 18:04:46
18Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos  Dept. of Electrical and Computer Engineering

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
19A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
20Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Symmetric-Key Cryptography —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:44