Search results
Jump to navigation
Jump to search
- ...re]] to distribute authentic public keys to the communicating parties. The security of YAK is disputed (see below and the [[Talk:YAK (cryptography)|talk page]] ==Security properties== ...6 KB (893 words) - 21:17, 10 February 2025
- ...n [[40-bit encryption]], this still represents a relatively low [[level of security]] in the context of a [[brute force attack]]. The US government traditionally regulated encryption for reasons of national security, law enforcement and foreign policy. Encryption was regulated from 1976 by ...4 KB (567 words) - 13:46, 10 February 2023
- ...er]] on best practices for [[de-identification]] of personally identifying data.{{r|compworld}} Her research interests shifted from finite geometry to information security and to effect that shift she moved in 2000 from Adelaide to CSIRO. ...5 KB (642 words) - 21:14, 22 November 2024
- ...SE) and other [[algorithm]]s that can be efficiently executed on encrypted data. ...information about the data or queries can be recovered from the encrypted data structure and tokens beyond a well-specified and "reasonable" leakage profi ...4 KB (515 words) - 04:03, 22 March 2024
- ...[[batch processing|batch]] mode for [[Import and export of data|exporting data]] from an institution. ...ing data can be used to re-identify individuals by linking or matching the data to other databases or by looking at unique characteristics found in the [[f ...5 KB (710 words) - 23:35, 9 December 2023
- ...lection.library.ethz.ch/eserv/eth:38650/eth-38650-02.pdf On the design and security of block ciphers]''. ETH Series in Information Processing, vol. 1, Hartung- ...ing a non-invertible ''round function'' whose input and output is half the data block size, each round uses a full-width invertible ''half-round function'' ...5 KB (870 words) - 03:37, 9 November 2024
- {{Short description|Security vulnerability in Diffie–Hellman key exchange}} ...20220224011050/https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|url-status=live}}</ref> ...12 KB (1,625 words) - 17:17, 5 July 2024
- ...Exchange by Juggling]. ''Proceedings of the 16th International Workshop on Security Protocols, 2008.''</ref> This protocol allows two parties to establish priv ...e other party based on the symmetry. This reduces the number of the needed security proofs by half. ...10 KB (1,480 words) - 21:37, 26 February 2025
- ...financial derivative an additional traded security related to the original security needs to be added. This might be a Low Exercise Price Option (or short [[LE [[Category:Trees (data structures)]] ...3 KB (486 words) - 13:47, 9 April 2024
- |<ref>{{cite web|url=http://www-01.ibm.com/software/data/cognos/index.html|title=Cognos Business Intelligence and Financial Performa ==Data storage modes== ...30 KB (3,664 words) - 06:15, 21 February 2025
- ...f hash function security/[[cryptanalysis]] can be found at [[hash function security summary]]. | rowspan="4"|[[National Security Agency|NSA]] ...16 KB (1,865 words) - 21:08, 6 August 2024
- ...ey (cryptography)|cryptographic keys]] that can be used to decrypt or sign data. The term is generally used in the context of attacks which search memory m ...ormer relies on detecting differences in the statistical properties of the data that make up cryptographic keys while the latter relies on determining spec ...7 KB (1,210 words) - 15:20, 7 January 2025
- ...ucture. The temporal order of issued time-stamps is also protected by this data structure, making backdating of the issued time-stamps impossible, even by The top of the authenticated data structure is generally ''published'' in some hard-to-modify and widely witn ...13 KB (1,730 words) - 04:20, 21 August 2023
- ...: Extortion-Based Security Threats and Countermeasures," IEEE Symposium on Security & Privacy, pp. 129-141, 1996.</ref> A cryptovirus is a virus that contains In the cryptoviral extortion attack, the virus hybrid encrypts [[plaintext]] data on the victim's machine using the randomly generated IV and SK. The IV+SK a ...8 KB (1,175 words) - 06:41, 15 February 2025
- ...itle=Proceedings of the 13th ACM conference on Computer and communications security |chapter=Searchable symmetric encryption |date=2006-10-30|chapter-url=https ..., one can generate a search token <math>tk</math> with which the encrypted data collection can be searched for <math>w</math>. The result of the search is ...17 KB (2,541 words) - 04:06, 22 July 2024
- ...neier |first=Bruce |publisher= |date=January 17, 2023 |website=Schneier on Security |access-date=December 12, 2024}}</ref> ...the first, <math>w</math> round key words are added to the <math>w</math> data words. To calculate the round keys an additional key word <math>k_w</math> ...10 KB (1,423 words) - 06:34, 17 December 2024
- ...ity of 2<sup>125.47</sup> using the structural linear relations.<ref name="Security analysis of PRINCE" /> ...lexity is 2<sup>33</sup> and the time complexity 2<sup>64</sup>.<ref name="Security analysis of PRINCE" /> ...13 KB (1,867 words) - 14:37, 2 May 2024
- ...on Foundations of Computer Science, 2003. Proceedings. |chapter=On the (In)security of the Fiat-Shamir paradigm |date=October 2003 |pages=102–113 |doi=10.1109/ ...hash value used below does not depend on the (public) value of ''y'', the security of the scheme is weakened, as a malicious prover can then select a certain ...8 KB (1,179 words) - 10:35, 16 February 2025
- ...privacy analysis of the document 'PEPP-PT: Data Protection and Information Security Architecture'|last=|first=|date=19 April 2020|website=[[GitHub]]|access-dat ...ntation/blob/master/10-data-protection/PEPP-PT-data-protection-information-security-architecture-Germany.pdf|access-date=2020-06-24|website=GitHub|language=en} ...13 KB (1,838 words) - 13:34, 3 October 2024
- ...'padded uniform random blob''' or '''PURB''' is a discipline for encrypted data formats designed to minimize unintended information leakage either from its ...cidentally-leaked metadata in facilitating attacks, such as by identifying data encrypted with weak ciphers or obsolete algorithms, fingerprinting applicat ...11 KB (1,645 words) - 08:12, 4 January 2023