Matches in DBpedia 2014 for { ?s ?p <http://dbpedia.org/class/yago/CryptographicAttacks> . }
Showing items 1 to 78 of
78
with 100 items per page.
- Adaptive_chosen-ciphertext_attack type CryptographicAttacks.
- Adversary_(cryptography) type CryptographicAttacks.
- Attack_model type CryptographicAttacks.
- Banburismus type CryptographicAttacks.
- Birthday_attack type CryptographicAttacks.
- Bit-flipping_attack type CryptographicAttacks.
- Black-bag_cryptanalysis type CryptographicAttacks.
- Black_bag_operation type CryptographicAttacks.
- Boomerang_attack type CryptographicAttacks.
- Brute-force_attack type CryptographicAttacks.
- Chosen-ciphertext_attack type CryptographicAttacks.
- Chosen-plaintext_attack type CryptographicAttacks.
- Ciphertext-only_attack type CryptographicAttacks.
- Collision_(computer_science) type CryptographicAttacks.
- Collision_attack type CryptographicAttacks.
- Contact_analysis_(cryptanalysis) type CryptographicAttacks.
- Coppersmith's_Attack type CryptographicAttacks.
- Correlation_attack type CryptographicAttacks.
- Cube_attack type CryptographicAttacks.
- Custom_hardware_attack type CryptographicAttacks.
- DMA_attack type CryptographicAttacks.
- Davies'_attack type CryptographicAttacks.
- Decimalization_table_attack type CryptographicAttacks.
- Dictionary_attack type CryptographicAttacks.
- Differential-linear_attack type CryptographicAttacks.
- Differential_cryptanalysis type CryptographicAttacks.
- Differential_equations_of_addition type CryptographicAttacks.
- Distinguishing_attack type CryptographicAttacks.
- Frequency_analysis type CryptographicAttacks.
- Gardening_(cryptanalysis) type CryptographicAttacks.
- Hardware_keylogger type CryptographicAttacks.
- Higher-order_differential_cryptanalysis type CryptographicAttacks.
- Impossible_differential_cryptanalysis type CryptographicAttacks.
- Index_of_coincidence type CryptographicAttacks.
- Integral_cryptanalysis type CryptographicAttacks.
- Interlock_protocol type CryptographicAttacks.
- Interpolation_attack type CryptographicAttacks.
- Kasiski_examination type CryptographicAttacks.
- Key-recovery_attack type CryptographicAttacks.
- Keystroke_logging type CryptographicAttacks.
- Known-plaintext_attack type CryptographicAttacks.
- Linear_cryptanalysis type CryptographicAttacks.
- Man-in-the-middle_attack type CryptographicAttacks.
- Meet-in-the-middle_attack type CryptographicAttacks.
- Message_forgery type CryptographicAttacks.
- Metasploit_Project type CryptographicAttacks.
- Mod_n_cryptanalysis type CryptographicAttacks.
- Padding_oracle_attack type CryptographicAttacks.
- Partitioning_cryptanalysis type CryptographicAttacks.
- Passive_attack type CryptographicAttacks.
- Password_cracking type CryptographicAttacks.
- Piling-up_lemma type CryptographicAttacks.
- Preimage_attack type CryptographicAttacks.
- Pwdump type CryptographicAttacks.
- Rainbow_table type CryptographicAttacks.
- Ransomware_(malware) type CryptographicAttacks.
- Related-key_attack type CryptographicAttacks.
- Replay_attack type CryptographicAttacks.
- Rootkit type CryptographicAttacks.
- Rotational_cryptanalysis type CryptographicAttacks.
- Rubber-hose_cryptanalysis type CryptographicAttacks.
- Side_channel_attack type CryptographicAttacks.
- Sinkov_statistic type CryptographicAttacks.
- Slide_attack type CryptographicAttacks.
- Small_subgroup_confinement_attack type CryptographicAttacks.
- Steganalysis type CryptographicAttacks.
- Stream_cipher_attack type CryptographicAttacks.
- Supply_chain_attack type CryptographicAttacks.
- Table_of_costs_of_operations_in_elliptic_curves type CryptographicAttacks.
- Traffic_analysis type CryptographicAttacks.
- Truncated_differential_cryptanalysis type CryptographicAttacks.
- Turingery type CryptographicAttacks.
- Watermarking_attack type CryptographicAttacks.
- Weak_key type CryptographicAttacks.
- Wiener's_Attack type CryptographicAttacks.
- XSL_attack type CryptographicAttacks.
- Zendian_problem type CryptographicAttacks.
- Zygalski_sheets type CryptographicAttacks.