-
1
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 Springer-Verlag, Berlin Germany, Dec.
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer-Verlag, Berlin Germany, Dec. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
2
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
-
T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 Springer-Verlag, Berlin Germany, Dec.
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 317-330. Springer-Verlag, Berlin Germany, Dec. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84948993474
-
A known plaintext attack on the PKZIP stream cipher
-
B. Preneel, editor, Fast Software Encryption' 94, volume 1008 Springer-Verlag, Berlin Germany
-
E. Biham and P. Kocher. A known plaintext attack on the PKZIP stream cipher. In B. Preneel, editor, Fast Software Encryption' 94, volume 1008 of Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.1008
-
-
Biham, E.1
Kocher, P.2
-
6
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 Springer-Verlag, Berlin Germany
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 451-472. Springer-Verlag, Berlin Germany, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 451-472
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
14844282243
-
-
Dec.
-
Info-ZIP. Info-ZIP note, 20011203, Dec. 2001. Available at ftp://ftp.info-zip.org/pub/infozip/doc/appnote-011203-iz.zip.
-
(2001)
Info-ZIP Note, 20011203
-
-
-
10
-
-
84893988353
-
Implementation of chosen-ciphertext attacks against PGP and GnuPG
-
A. H. Chan and V. D. Gligor, editors, Information Security, 5th International Conference, volume 2433 Springer-Verlag, Berlin Germany
-
K. Jallad, J. Katz, and B. Schneier. Implementation of chosen-ciphertext attacks against PGP and GnuPG. In A. H. Chan and V. D. Gligor, editors, Information Security, 5th International Conference, volume 2433 of Lecture Notes in Computer Science, pages 90-101. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2433
, pp. 90-101
-
-
Jallad, K.1
Katz, J.2
Schneier, B.3
-
13
-
-
85084164298
-
A chosen ciphertext attack against several e-mail encryption protocols
-
J. Katz and B. Schneier. A chosen ciphertext attack against several e-mail encryption protocols. In Ninth USENIX Security Symposium, 2000.
-
(2000)
Ninth USENIX Security Symposium
-
-
Katz, J.1
Schneier, B.2
-
14
-
-
84974720881
-
Unforgeable encryption and chosen ciphertext secure modes of operation
-
B. Schneier, editor, Fast Software Encryption 2000, volume 1978 Springer-Verlag, Berlin Germany, Apr.
-
J. Katz and M. Yung. Unforgeable encryption and chosen ciphertext secure modes of operation. In B. Schneier, editor, Fast Software Encryption 2000, volume 1978 of Lecture Notes in Computer Science, pages 284-299. Springer-Verlag, Berlin Germany, Apr. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
15
-
-
84949424837
-
Compression and information leakage of plaintext
-
J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 Springer-Verlag, Berlin Germany
-
J. Kelsey. Compression and information leakage of plaintext. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 263-276. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 263-276
-
-
Kelsey, J.1
-
16
-
-
14844301580
-
Attacking and repairing the WinZip encryption scheme
-
Full version of this paper
-
T. Kohno. Attacking and repairing the WinZip encryption scheme. Cryptology ePrint Archive Report 2004/078, http://eprint.iacr.org/2004/078/, 2004. Full version of this paper.
-
(2004)
Cryptology EPrint Archive Report 2004/078
-
-
Kohno, T.1
-
17
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 Springer-Verlag, Berlin Germany, Aug.
-
H. Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 310-331. Springer-Verlag, Berlin Germany, Aug. 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
18
-
-
84937401544
-
(Not so) random shuffles of RC4
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 Springer-Verlag, Berlin Germany
-
I. Mironov. (Not so) random shuffles of RC4. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 304-319. Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 304-319
-
-
Mironov, I.1
-
19
-
-
14844317560
-
-
Apr. Version 6.2.0
-
PKWARE. APPNOTE.TXT - .ZIP File Format Specification, Apr. 2004. Version 6.2.0, available at http://wvw.pkware.com/products/enterprise/white_papers/ appnote.txt.
-
(2004)
APPNOTE.TXT - .ZIP File Format Specification
-
-
-
22
-
-
84958976457
-
ZIP attacks with reduced known plaintext
-
M. Matsui, editor, Fast Software Encryption 2001, volume 2355 Springer-Verlag, Berlin Germany
-
M. Stay. ZIP attacks with reduced known plaintext. In M. Matsui, editor, Fast Software Encryption 2001, volume 2355 of Lecture Notes in Computer Science, pages 124-134. Springer-Verlag, Berlin Germany, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2355
, pp. 124-134
-
-
Stay, M.1
-
25
-
-
14844302317
-
-
Apr.
-
WinZip Computing, Inc. Download WinZip add-ons, Apr. 2004. Available at http://www.winzip.com/daddons.htm.
-
(2004)
Download WinZip Add-ons
-
-
-
26
-
-
84966842346
-
-
Mar.
-
WinZip Computing, Inc. Homepage, Mar. 2004. Available at http://www.winzip.com/.
-
(2004)
Homepage
-
-
-
27
-
-
14844305960
-
-
Mar.
-
WinZip Computing, Inc. What's new in WinZip 9.0, Mar. 2004. Available at http://www.winzip.com/whatsnew90.htm.
-
(2004)
What's New in WinZip 9.0
-
-
|