from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • noun Plural form of ciphertext.


Sorry, no etymologies found.


Help support Wordnik (and make this page ad-free) by adopting the word ciphertexts.


  • In this pamphlet, Ward purportedly transcribes what the Viginian innkeeper William Morriss recalls near the end of his life in 1862 and reprints the ciphertexts in full.

    Wired Top Stories Jane Doh 2011

  • All three ciphertexts, while likely using the same encryption method, seem to involve different books as keys to the cipher.

    Wired Top Stories Jane Doh 2011

  • One of them, named Thomas Jefferson Beale, leaves three ciphertexts, simply strings of comma-separated numbers, with an innkeeper in Virginia, who forgets about it for over twenty years.

    Wired Top Stories Jane Doh 2011

  • "We were able to decrypt data by sending modified ciphertexts to the server, by gathering information from the received error messages," the pair wrote in their paper, presented at ACM.

    Ars Technica Sean Gallagher 2011

  • Frustrated, he then tells the story and passes along the texts to a friend, J.B. Ward, who cracks one of the three ciphertexts, but not the one that actually gives the precise location of the treasure.

    Wired Top Stories Jane Doh 2011

  • Consider a longest sequence ocs of nested ciphertexts in t such that ocs0 contains a single oc - currence of the encrypt operator and for all k from 0 to jocsj, 2, ocsk is an occurrence of a proper subterm of ocsk + 1.

    Recently Uploaded Slideshows techdude 2010

  • Attackers can also use the technique to map all ciphertexts to corresponding plaintexts, a feat that breaks a website's underlying cryptosystem.

    The Register 2010

  • Multiple integer underflow flaws, leading to heap-based corruption, were found in the way the MIT Kerberos Key Distribution Center (KDC) decrypted ciphertexts encrypted with the Advanced Encryption Standard (AES) and ARCFOUR (RC4) encryption algorithms. - Security Advisories 2010

  • The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the ciphertexts stored within OpenDHT are anonymous and unlinkable.

    Planet openSUSE 2010

  • For each encryption hj; oci in e, there is at most one element of ocs having hj; oci as its source, because all occurrences of ciphertexts having the same source are occurrences of the same term, while each element of ocs is an occurrence of a distinct term.

    Recently Uploaded Slideshows techdude 2010


Log in or sign up to get involved in the conversation. It's quick and easy.