메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 555-570

Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1.2.3

Author keywords

Cryptanalysis; ElGamal; GnuPG; GPG; Implementation; OpenPGP; Public key cryptography; RSA

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; OPEN SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; REVERSE ENGINEERING; SOFTWARE ENGINEERING;

EID: 35048881103     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_33     Document Type: Article
Times cited : (28)

References (30)
  • 1
    • 35048884312 scopus 로고    scopus 로고
    • Cryptography and the Internet
    • Proc. of Crypto '98, IACR, Springer-Verlag
    • D. M. Bellovin. Cryptography and the Internet. In Proc. of Crypto '98, volume 1462 of LNCS. IACR, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462
    • Bellovin, D.M.1
  • 2
    • 35048877979 scopus 로고    scopus 로고
    • On the generation of one-time keys in DSS
    • Manuscript, February 2001. Result presented
    • D. Bleichenbacher. On the generation of one-time keys in DSS. Manuscript, February 2001. Result presented at the Monteverita workshop of March 2001.
    • (2001) Monteverita Workshop of March
    • Bleichenbacher, D.1
  • 3
    • 84947913130 scopus 로고    scopus 로고
    • Generating ElGamal signatures without knowing the secret key
    • Proc. of Eurocrypt '96, IACR, Springer-Verlag
    • D. Bleichenbacher. Generating ElGamal signatures without knowing the secret key. In Proc. of Eurocrypt '96, volume 1070 of LNCS, pages 10-18. IACR, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 10-18
    • Bleichenbacher, D.1
  • 4
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • Proc. of Crypto '98, IACR, Springer-Verlag
    • D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In Proc. of Crypto '98, volume 1462 of LNCS, pages 1-12. IACR, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 5
    • 84937418785 scopus 로고    scopus 로고
    • Why textbook ElGamal and RSA encryption are insecure
    • Proc. of Asiacrypt '00, IACR, Springer-Verlag
    • D. Boneh, A. Joux, and P. Q. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In Proc. of Asiacrypt '00, volume 1976 of LNCS, pages 30-43. IACR, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 30-43
    • Boneh, D.1    Joux, A.2    Nguyen, P.Q.3
  • 7
    • 84957066742 scopus 로고    scopus 로고
    • On the security of RSA padding
    • Proc. of Crypto '99, IACR, Springer-Verlag
    • J.-S. Coron, D. Naccache, and J. P. Stern. On the security of RSA padding. In Proc. of Crypto '99, volume 1666 of LNCS, pages 1-18. IACR, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 1-18
    • Coron, J.-S.1    Naccache, D.2    Stern, J.P.3
  • 9
    • 0029755067 scopus 로고    scopus 로고
    • Randomness and the Netscape browser
    • January
    • I. Goldberg and D. Wagner. Randomness and the Netscape browser. Dr Dobb's, January 1996.
    • (1996) Dr Dobb's
    • Goldberg, I.1    Wagner, D.2
  • 16
    • 84893988353 scopus 로고    scopus 로고
    • Implementation of chosen-ciphertext attacks against PGP and GnuPG
    • Proc. of ISO '02, Springer-Verlag
    • K. Jallad, J. Katz, and B. Schneier. Implementation of chosen-ciphertext attacks against PGP and GnuPG. In Proc. of ISO '02, volume 2433 of LNCS. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2433
    • Jallad, K.1    Katz, J.2    Schneier, B.3
  • 21
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as standardized in PKCS #1 v2.0
    • Proc. of Crypto '01, IACR, Springer-Verlag
    • J. Manger. A chosen ciphertext attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as standardized in PKCS #1 v2.0. In Proc. of Crypto '01, volume 2139 of LNCS, pages 230-231. IACR, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 230-231
    • Manger, J.1
  • 22
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the Digital Signature Algorithm with partially known nonces
    • P. Q. Nguyen and I. E. Shparlinski. The insecurity of the Digital Signature Algorithm with partially known nonces. Journal of Cryptology, 15(3), 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 24
    • 33846867921 scopus 로고    scopus 로고
    • The two faces of lattices in cryptology
    • Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
    • P. Q. Nguyen and J. Stern. The two faces of lattices in cryptology. In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, pages 146-180. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2146 , pp. 146-180
    • Nguyen, P.Q.1    Stern, J.2
  • 25
    • 1842499869 scopus 로고    scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • Proc. of Eurocrypt '96, IACR, Springer-Verlag
    • P. C. van Oorschot and M. J. Wiener. On Diffie-Hellman key agreement with short exponents. In Proc. of Eurocrypt '96, volume 1070 of LNCS, pages 332-343. IACR, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 332-343
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 26
    • 35048840888 scopus 로고    scopus 로고
    • OpenPGP. http://www.openpgp.org.
  • 28
    • 0033312792 scopus 로고    scopus 로고
    • Security in the real world: How to evaluate security technology
    • B. Schneier. Security in the real world: How to evaluate security technology. Computer Security Journal, XV(4), 1999.
    • (1999) Computer Security Journal , vol.15 , Issue.4
    • Schneier, B.1
  • 30
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in applying proof methodologies to signature schemes
    • Proc. of Crypto '02, IACR, Springer-Verlag
    • J. Stern, D. Pointcheval, J. Malone-Lee, and N. P. Smart. Flaws in applying proof methodologies to signature schemes. In Proc. of Crypto '02, volume 2442 of LNCS, pages 93-110. IACR, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 93-110
    • Stern, J.1    Pointcheval, D.2    Malone-Lee, J.3    Smart, N.P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.