-
1
-
-
0003315821
-
IP Encapsulating Security Payload (ESP)
-
August
-
R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 1827, August 1995.
-
(1995)
RFC
, vol.1827
-
-
Atkinson, R.1
-
2
-
-
0003234495
-
Requirements for IPv4 routers
-
June
-
F. Baker, "Requirements for IPv4 Routers", RFC 1812, June 1995.
-
(1995)
RFC
, vol.1812
-
-
Baker, F.1
-
3
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
-
May
-
M. Bellare, T. Kohno and C. Namprempre, "Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm." ACM TISSEC, Vol. 7, No. 2, May 2004, pp. 206-241.
-
(2004)
ACM TISSEC
, vol.7
, Issue.2
, pp. 206-241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
4
-
-
84937407719
-
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
-
T. Okamoto (ed.), LNCS, Springer-Verlag
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm." In T. Okamoto (ed.), Advances in Cryptology - ASIACRYPT 2000, LNCS Vol. 1976, Springer-Verlag, 2000, pp. 531-545.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
-
T. Okamoto (ed.), LNCS, Springer-Verlag
-
M. Bellare and P. Rogaway, "Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography." In T. Okamoto (ed.), Advances in Cryptology - ASIACRYPT 2000, LNCS Vol. 1976, Springer-Verlag, 2000, pp.317-330.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, vol.1976
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
85084160050
-
Problem areas for the IP security protocols
-
San Jose, CA, July
-
S. Bellovin, "Problem Areas for the IP Security Protocols", in Proceedings of the Sixth Usenix Unix Security Symposium, pp. 1-16, San Jose, CA, July 1996.
-
(1996)
Proceedings of the Sixth Usenix Unix Security Symposium
, pp. 1-16
-
-
Bellovin, S.1
-
7
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
ACM Press
-
N. Borisov, I. Goldberg and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", in Proc. MOBICOM 2001, ACM Press, 2001, pp. 180-189.
-
(2001)
Proc. MOBICOM 2001
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
8
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
D. Boneh (ed.), LNCS, Springer-Verlag
-
B.Canvel, A.P. Hiltgen, S. Vaudenay and M. Vuagnoux, "Password Interception in a SSL/TLS Channel," in D. Boneh (ed.), Advances in Cryptology - CRYPTO 2003, LNCS Vol. 2729, Springer-Verlag, 2003, pp. 583-599
-
(2003)
Advances in Cryptology - CRYPTO 2003
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.P.2
Vaudenay, S.3
Vuagnoux, M.4
-
11
-
-
33746050083
-
The AES-CBC cipher algorithm and its use with IPsec
-
Sept.
-
S. Frankel, R. Glenn and S. Kelly, "The AES-CBC Cipher Algorithm and Its Use with IPsec", RFC 3602, Sept. 2003.
-
(2003)
RFC
, vol.3602
-
-
Frankel, S.1
Glenn, R.2
Kelly, S.3
-
12
-
-
33746070680
-
-
NIST Special Publication 800-77 (Draft), January
-
S. Frankel, K. Kent, R. Lewkowski, A.D. Orebaugh, R.W. Ritchey and S.R. Sharma, "Guide to IPsec VPNs", NIST Special Publication 800-77 (Draft), January 2005.
-
(2005)
Guide to IPsec VPNs
-
-
Frankel, S.1
Kent, K.2
Lewkowski, R.3
Orebaugh, A.D.4
Ritchey, R.W.5
Sharma, S.R.6
-
13
-
-
0003272021
-
The Internet Key Exchange (IKE)
-
Nov.
-
D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, Nov. 1998.
-
(1998)
RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
14
-
-
84974720881
-
Unforgeable encryption and chosen ciphertext secure modes of operation
-
B. Schneier (ed.), LNCS, Springer-Verlag
-
J. Katz and M. Yung, "Unforgeable encryption and chosen ciphertext secure modes of operation," In B. Schneier (ed.), FSE 2000, LNCS Vol. 1978, Springer-Verlag 2001, pp. 284-299.
-
(2001)
FSE 2000
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
15
-
-
0003068282
-
Security architecture for the Internet protocol
-
Nov.
-
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
16
-
-
0003315821
-
IP Encapsulating Security Payload (ESP)
-
Nov.
-
S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 2406, Nov. 1998.
-
(1998)
RFC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
17
-
-
33746084746
-
Security architecture for the Internet protocol
-
(obsoletes RFC 2401), Dec.
-
S. Kent and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301 (obsoletes RFC 2401), Dec. 2005.
-
(2005)
RFC
, vol.4301
-
-
Kent, S.1
Seo, K.2
-
18
-
-
33746104718
-
IP Encapsulating Security Payload (ESP)
-
(obsoletes RFC 2406), Dec.
-
S. Kent, "IP Encapsulating Security Payload (ESP)", RFC 4303 (obsoletes RFC 2406), Dec. 2005.
-
(2005)
RFC
, vol.4303
-
-
Kent, S.1
-
19
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
J. Kilian (ed.), LNCS, Springer-Verlag
-
H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)", in J. Kilian (ed.), Advances in Cryptology - CRYPTO 2001, LNCS Vol. 2139, Springer-Verlag 2001, pp. 310-331.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
20
-
-
33746062714
-
-
Sept.
-
Internet Protocol, RFC 791, Sept. 1981.
-
(1981)
RFC
, vol.791
-
-
-
21
-
-
0009547332
-
The ESP DES-CBC cipher algorithm with explicit IV
-
Nov.
-
C. Madson and N. Doraswamy, "The ESP DES-CBC Cipher Algorithm With Explicit IV", RFC 2405, Nov. 1998.
-
(1998)
RFC
, vol.2405
-
-
Madson, C.1
Doraswamy, N.2
-
22
-
-
77954117749
-
Initialization vector attacks on the IPsec protocol suite
-
IEEE Computer Society
-
C.B. McCubbin, A.A. Selcuk and D. Sidhu, "Initialization vector attacks on the IPsec protocol suite." In WETICE 2000, IEEE Computer Society, pp. 171-175.
-
WETICE 2000
, pp. 171-175
-
-
McCubbin, C.B.1
Selcuk, A.A.2
Sidhu, D.3
-
23
-
-
35048881103
-
Can we trust cryptographic software? Cryptographic flaws in GNU Privacy Guard v1.2.3
-
C. Cachin (ed.), LNCS, Springer-Verlag
-
P.Q. Nguyen, "Can we trust cryptographic software? Cryptographic flaws in GNU Privacy Guard v1.2.3", in C. Cachin (ed.), Advances in Cryptology - EUROCRYPT 2004, LNCS Vol. 3027, Springer-Verlag 2004, pp. 555-570.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, vol.3027
, pp. 555-570
-
-
Nguyen, P.Q.1
-
24
-
-
84941166035
-
-
NISCC Vulnerability Advisory IPSEC - 004033, 9th May
-
NISCC Vulnerability Advisory IPSEC - 004033, 9th May 2005. Available from http://www.niscc.gov.uk/niscc/docs/al-20050509-00386.html?lang=en.
-
(2005)
-
-
-
26
-
-
4444351714
-
The ESP CBC-mode cipher algorithms
-
Nov.
-
R. Pereira and R. Adams, "The ESP CBC-Mode Cipher Algorithms", RFC 2451, Nov. 1998.
-
(1998)
RFC
, vol.2451
-
-
Pereira, R.1
Adams, R.2
-
27
-
-
0003232377
-
Internet control message protocol
-
Sept.
-
J. Postel, "Internet Control Message Protocol", RFC 792, Sept. 1981.
-
(1981)
RFC
, vol.792
-
-
Postel, J.1
-
28
-
-
0026851843
-
On message integrity in cryptographic protocols
-
May
-
S. Stubblebine and V. Gligor, "On Message Integrity in Cryptographic Protocols", in IEEE Security and Privacy, May 1992, pp. 85-104.
-
(1992)
IEEE Security and Privacy
, pp. 85-104
-
-
Stubblebine, S.1
Gligor, V.2
-
29
-
-
84947212539
-
Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
-
L.R. Knudsen (ed.), LNCS, Springer-Verlag
-
S. Vaudenay, "Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS...", in L.R. Knudsen (ed.), Advances in Cryptology - EUROCRYPT 2002, LNCS Vol. 2332, Springer-Verlag 2002, pp. 534-545.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002
, vol.2332
, pp. 534-545
-
-
Vaudenay, S.1
-
30
-
-
85073480054
-
The perils of unauthenticated encryption: Kerberos version 4
-
The Internet Society
-
T. Yu, S. Hartman and K. Raeburn, "The perils of unauthenticated encryption: Kerberos version 4", in Proc. NDSS 2004, The Internet Society, 2004.
-
(2004)
Proc. NDSS 2004
-
-
Yu, T.1
Hartman, S.2
Raeburn, K.3
|