Known-plaintext attack

Results: 101



#Item
31Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:33
32Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
33Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1  2

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
34Beds / Mattress / Infant bed / Bed sheet / Playpen / Known-plaintext attack / Home / Bedding / Child safety

Page TWO Child Care Licensing 160 East Kellogg Blvd St Paul, MN 55101 651[removed]

Add to Reading List

Source URL: co.ramsey.mn.us

Language: English - Date: 2015-02-02 03:02:11
35Child Care Licensing 160 East Kellogg Blvd St Paul, MN[removed]3781  Crib Compliance Documentation Form

Child Care Licensing 160 East Kellogg Blvd St Paul, MN[removed]3781 Crib Compliance Documentation Form

Add to Reading List

Source URL: co.ramsey.mn.us

Language: English - Date: 2015-02-02 03:02:11
36yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:57
37Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
38Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Cipher Type Detection Malte Nuhn Human Language Technology and Pattern Recognition Group Computer Science Department RWTH Aachen University

Add to Reading List

Source URL: www-i6.informatik.rwth-aachen.de

Language: English
39Division of Children and Family Services P.O. Box 1437, Slot S-560 · Little Rock, AR[removed][removed] · Fax: [removed] · TDD: [removed]January 28, 2011

Division of Children and Family Services P.O. Box 1437, Slot S-560 · Little Rock, AR[removed][removed] · Fax: [removed] · TDD: [removed]January 28, 2011

Add to Reading List

Source URL: www.fosterarkansas.org

Language: English - Date: 2011-02-16 16:02:38
40Report  Understanding Crypto-Ransomware In-Depth Analysis of the Most Popular Malware Families

Report Understanding Crypto-Ransomware In-Depth Analysis of the Most Popular Malware Families

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2014-12-18 20:37:23