Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,981,011 papers from all fields of science
Search
Sign In
Create Free Account
Ciphertext stealing
In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Block cipher mode of operation
Block size (cryptography)
Ciphertext
Crypto++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Survey Paper on H2S Shoulder Surfing Improves Honeyword Encryption
K. Dalvi
,
Deepak Dharrao
,
M. Student
2018
Corpus ID: 212613945
: When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An…
Expand
2018
2018
Result Analysis on H2S Sholder Surfing improves Honeyword Encryption
K. Dalvi
,
Deepak Dharrao
,
Manjusha Tatyia
,
Student
2018
Corpus ID: 212550204
: When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An…
Expand
2016
2016
Modified version of XTS (XOR-Encrypt-XOR with Ciphertext Stealing) using tweakable enciphering scheme
Rashmita Padhi
,
Pandaba Pradhan
International Conference on Communication and…
2016
Corpus ID: 30258619
In this paper, we study a particular class of symmetric algorithms that aim to ensure confidentiality by using a functionality…
Expand
2016
2016
AES Encryption with HMAC-SHA2 for Kerberos 5
Michael J. Jenkins
,
Michael A. Peck
,
Kelley W. Burgin
Request for Comments
2016
Corpus ID: 26313599
This document specifies two encryption types and two corresponding checksum types for Kerberos 5. The new types use AES in CTS…
Expand
Review
2016
Review
2016
A Security Assessment of Android Full-disk Encryption 1
Oliver Kunz
2016
Corpus ID: 29863009
Lost or stolen smartphones need protection. Full-disk encryption has become a popular method of protecting data stored on a…
Expand
1963
1963
Dual Sovereignty and Double Jeopardy: A Critique of Bartkus v. Illinois and Abbate v. United States
George C. Pontikes
1963
Corpus ID: 156737164