Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,078,553 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext stealing
In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Block cipher mode of operation
Block size (cryptography)
Ciphertext
Crypto++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Survey Paper on H2S Shoulder Surfing Improves Honeyword Encryption
Khushal Dalvi
,
Deepak Dharrao
,
M. Student
2018
Corpus ID: 212613945
: When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An…
Expand
2018
2018
Result Analysis on H2S Sholder Surfing improves Honeyword Encryption
Khushal Dalvi
,
Deepak Dharrao
,
Manjusha Tatyia
,
Student
2018
Corpus ID: 212550204
: When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An…
Expand
2016
2016
Modified version of XTS (XOR-Encrypt-XOR with Ciphertext Stealing) using tweakable enciphering scheme
Rashmita Padhi
,
Pandaba Pradhan
International Conference on Communication and…
2016
Corpus ID: 30258619
In this paper, we study a particular class of symmetric algorithms that aim to ensure confidentiality by using a functionality…
Expand
2016
2016
AES Encryption with HMAC-SHA2 for Kerberos 5
Michael J. Jenkins
,
Michael A. Peck
,
Kelley W. Burgin
Request for Comments
2016
Corpus ID: 26313599
This document specifies two encryption types and two corresponding checksum types for Kerberos 5. The new types use AES in CTS…
Expand
Review
2016
Review
2016
A Security Assessment of Android Full-disk Encryption 1
Oliver Kunz
2016
Corpus ID: 29863009
Lost or stolen smartphones need protection. Full-disk encryption has become a popular method of protecting data stored on a…
Expand
2015
2015
A Lightweight Encryption and Secure Protocol for Smartphone Cloud
William Zegers
,
Sang-Yoon Chang
,
Younghee Park
,
J. Gao
IEEE Symposium on Service-Oriented System…
2015
Corpus ID: 15330305
User data on mobile devices are always transferred into Cloud for flexible and location-independent access to services and…
Expand
2015
2015
Advanced Encryption Standard-XTS implementation in field programmable gate array hardware
Shakil Ahmed
,
K. Samsudin
,
A. R. Ramli
,
F. Rokhani
Secur. Commun. Networks
2015
Corpus ID: 209788
In recent years, security has been a common concern for the data in-transit between communication networks as well as data at…
Expand
2012
2012
Camellia Encryption for Kerberos 5
Greg Hudson
Request for Comments
2012
Corpus ID: 36396472
This document specifies two encryption types and two corresponding checksum types for the Kerberos cryptosystem framework defined…
Expand
1963
1963
Dual Sovereignty and Double Jeopardy: A Critique of Bartkus v. Illinois and Abbate v. United States
George C. Pontikes
1963
Corpus ID: 156737164
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE