Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...re]] to distribute authentic public keys to the communicating parties. The security of YAK is disputed (see below and the [[Talk:YAK (cryptography)|talk page]] ==Security properties== ...
    6 KB (893 words) - 21:17, 10 February 2025
  • ...n [[40-bit encryption]], this still represents a relatively low [[level of security]] in the context of a [[brute force attack]]. The US government traditionally regulated encryption for reasons of national security, law enforcement and foreign policy. Encryption was regulated from 1976 by ...
    4 KB (567 words) - 13:46, 10 February 2023
  • ...er]] on best practices for [[de-identification]] of personally identifying data.{{r|compworld}} Her research interests shifted from finite geometry to information security and to effect that shift she moved in 2000 from Adelaide to CSIRO. ...
    5 KB (642 words) - 21:14, 22 November 2024
  • ...SE) and other [[algorithm]]s that can be efficiently executed on encrypted data. ...information about the data or queries can be recovered from the encrypted data structure and tokens beyond a well-specified and "reasonable" leakage profi ...
    4 KB (515 words) - 04:03, 22 March 2024
  • ...[[batch processing|batch]] mode for [[Import and export of data|exporting data]] from an institution. ...ing data can be used to re-identify individuals by linking or matching the data to other databases or by looking at unique characteristics found in the [[f ...
    5 KB (710 words) - 23:35, 9 December 2023
  • ...lection.library.ethz.ch/eserv/eth:38650/eth-38650-02.pdf On the design and security of block ciphers]''. ETH Series in Information Processing, vol. 1, Hartung- ...ing a non-invertible ''round function'' whose input and output is half the data block size, each round uses a full-width invertible ''half-round function'' ...
    5 KB (870 words) - 03:37, 9 November 2024
  • {{Short description|Security vulnerability in Diffie–Hellman key exchange}} ...20220224011050/https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|url-status=live}}</ref> ...
    12 KB (1,625 words) - 17:17, 5 July 2024
  • ...Exchange by Juggling]. ''Proceedings of the 16th International Workshop on Security Protocols, 2008.''</ref> This protocol allows two parties to establish priv ...e other party based on the symmetry. This reduces the number of the needed security proofs by half. ...
    10 KB (1,480 words) - 21:37, 26 February 2025
  • ...financial derivative an additional traded security related to the original security needs to be added. This might be a Low Exercise Price Option (or short [[LE [[Category:Trees (data structures)]] ...
    3 KB (486 words) - 13:47, 9 April 2024
  • |<ref>{{cite web|url=http://www-01.ibm.com/software/data/cognos/index.html|title=Cognos Business Intelligence and Financial Performa ==Data storage modes== ...
    30 KB (3,664 words) - 06:15, 21 February 2025
  • ...f hash function security/[[cryptanalysis]] can be found at [[hash function security summary]]. | rowspan="4"|[[National Security Agency|NSA]] ...
    16 KB (1,865 words) - 21:08, 6 August 2024
  • ...ey (cryptography)|cryptographic keys]] that can be used to decrypt or sign data. The term is generally used in the context of attacks which search memory m ...ormer relies on detecting differences in the statistical properties of the data that make up cryptographic keys while the latter relies on determining spec ...
    7 KB (1,210 words) - 15:20, 7 January 2025
  • ...ucture. The temporal order of issued time-stamps is also protected by this data structure, making backdating of the issued time-stamps impossible, even by The top of the authenticated data structure is generally ''published'' in some hard-to-modify and widely witn ...
    13 KB (1,730 words) - 04:20, 21 August 2023
  • ...: Extortion-Based Security Threats and Countermeasures," IEEE Symposium on Security & Privacy, pp. 129-141, 1996.</ref> A cryptovirus is a virus that contains In the cryptoviral extortion attack, the virus hybrid encrypts [[plaintext]] data on the victim's machine using the randomly generated IV and SK. The IV+SK a ...
    8 KB (1,175 words) - 06:41, 15 February 2025
  • ...itle=Proceedings of the 13th ACM conference on Computer and communications security |chapter=Searchable symmetric encryption |date=2006-10-30|chapter-url=https ..., one can generate a search token <math>tk</math> with which the encrypted data collection can be searched for <math>w</math>. The result of the search is ...
    17 KB (2,541 words) - 04:06, 22 July 2024
  • ...neier |first=Bruce |publisher= |date=January 17, 2023 |website=Schneier on Security |access-date=December 12, 2024}}</ref> ...the first, <math>w</math> round key words are added to the <math>w</math> data words. To calculate the round keys an additional key word <math>k_w</math> ...
    10 KB (1,423 words) - 06:34, 17 December 2024
  • ...ity of 2<sup>125.47</sup> using the structural linear relations.<ref name="Security analysis of PRINCE" /> ...lexity is 2<sup>33</sup> and the time complexity 2<sup>64</sup>.<ref name="Security analysis of PRINCE" /> ...
    13 KB (1,867 words) - 14:37, 2 May 2024
  • ...on Foundations of Computer Science, 2003. Proceedings. |chapter=On the (In)security of the Fiat-Shamir paradigm |date=October 2003 |pages=102–113 |doi=10.1109/ ...hash value used below does not depend on the (public) value of ''y'', the security of the scheme is weakened, as a malicious prover can then select a certain ...
    8 KB (1,179 words) - 10:35, 16 February 2025
  • ...privacy analysis of the document 'PEPP-PT: Data Protection and Information Security Architecture'|last=|first=|date=19 April 2020|website=[[GitHub]]|access-dat ...ntation/blob/master/10-data-protection/PEPP-PT-data-protection-information-security-architecture-Germany.pdf|access-date=2020-06-24|website=GitHub|language=en} ...
    13 KB (1,838 words) - 13:34, 3 October 2024
  • ...'padded uniform random blob''' or '''PURB''' is a discipline for encrypted data formats designed to minimize unintended information leakage either from its ...cidentally-leaked metadata in facilitating attacks, such as by identifying data encrypted with weak ciphers or obsolete algorithms, fingerprinting applicat ...
    11 KB (1,645 words) - 08:12, 4 January 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)