-
1
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
-
M. Bellare, T. Kohno, and C. Namprempre. Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. ACM Transactions on Information and Systems Security, 7(2):206-241, 2004.
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.2
, pp. 206-241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
3
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
T. Okamoto, editor, LNCS 1976, Springer-Verlag
-
M. Bellare and C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In T. Okamoto, editor, Proccedings of ASIACRYPT 2000, LNCS 1976, pp. 531-545. Springer-Verlag, 2000.
-
(2000)
Proccedings of ASIACRYPT 2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on RSA encryption standard PKCS #1
-
H. Krawczyk, editor, LNCS 1462, Springer-Verlag
-
D. Bleichenbacher. Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1. In H. Krawczyk, editor, Proccedings of CRYPTO 1998, LNCS 1462, pp. 1-12. Springer-Verlag, 1998.
-
(1998)
Proccedings of CRYPTO 1998
, pp. 1-12
-
-
Bleichenbacher, D.1
-
7
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
In D. Boneh, editor, LNCS 2729, Springer-Verlag
-
B. Canvel, A.P. Hiltgen, S. Vaudenay, and M. Vuagnoux. Password Interception in a SSL/TLS Channel. In D. Boneh, editor, Proccedings of CRYPTO 2003, LNCS 2729, pp. 583-599. Springer-Verlag, 2003.
-
(2003)
Proccedings of CRYPTO 2003
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.P.2
Vaudenay, S.3
Vuagnoux, M.4
-
8
-
-
70449682305
-
-
14/11/, revised 17/11/2008
-
CPNI Vulnerability Advisory. Plaintext Recovery Attack Against SSH. http://www.cpni.gov.uk/Docs/Vulnerability-Advisory-SSH.txt, 14/11/2008 (revised 17/11/2008).
-
(2008)
Plaintext Recovery Attack Against SSH
-
-
-
9
-
-
0037615414
-
-
available from, 6th Feb
-
W. Dai. An Attack Against SSH2 Protocol. Email to the SECSH Working Group available from ftp://ftp.ietf.org/ietf-mail-archive/secsh/2002-2102.mail, 6th Feb. 2002.
-
(2002)
An Attack Against SSH2 Protocol
-
-
Dai, W.1
-
10
-
-
34548805571
-
Attacking the IPsec standards in encryption-only configurations
-
IEEE Computer Society
-
J.-P. Degabriele and K.G. Paterson. Attacking the IPsec Standards in Encryption-only Configurations. In IEEE Symposium on Security and Privacy, pp. 335-349, IEEE Computer Society, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 335-349
-
-
Degabriele, J.-P.1
Paterson, K.G.2
-
12
-
-
38149093714
-
Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC
-
In Moti Yung, editor, , LNCS 2442, Springer-Verlag
-
A. Joux, G. Martinet and F. Valette. Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC. In Moti Yung, editor, CRYPTO, LNCS 2442, pp. 17-30, Springer-Verlag, 2002.
-
(2002)
CRYPTO
, pp. 17-30
-
-
Joux, A.1
Martinet, G.2
Valette, F.3
-
15
-
-
70449691901
-
-
OpenSSH Security, http://www.openssh.org/security.html.
-
OpenSSH Security
-
-
-
16
-
-
52149124374
-
Immunising CBC mode against padding oracle attacks: A formal security treatment
-
In R. Ostrovsky, R. De Prisco and I. Visconti, editors, LNCS 5229, Springer-Verlag
-
K.G. Paterson and G.J. Watson. Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. In R. Ostrovsky, R. De Prisco and I. Visconti, editors, SCN 2008, LNCS 5229, pp. 340-357, Springer-Verlag, 2008.
-
(2008)
SCN 2008
, pp. 340-357
-
-
Paterson, K.G.1
Watson, G.J.2
-
17
-
-
33746067483
-
Cryptography in theory and practice: The case of encryption in IPsec
-
In S. Vaudenay, editor, LNCS 4004, Springer-Verlag
-
K.G. Paterson and A.K.L. Yau. Cryptography in Theory and Practice: The Case of Encryption in IPsec. In S. Vaudenay, editor, Eurocrypt 2006, LNCS 4004, pp. 12-29, Springer- Verlag, 2006.
-
(2006)
Eurocrypt 2006
, pp. 12-29
-
-
Paterson, K.G.1
Yau, A.K.L.2
-
18
-
-
70449661487
-
-
Scapy Homepage, http://www.secdev.org/projects/scapy/.
-
Scapy Homepage
-
-
-
19
-
-
70449655094
-
-
SSHFS Homepage, http://fuse.sourceforge.net/sshfs.html.
-
SSHFS Homepage
-
-
-
21
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
D. Song, D. Wagner and X. Tian. Timing Analysis of Keystrokes and Timing Attacks on SSH. In 10th USENIX Security Symposium, 2001, http://www.usenix.org/ publications/library/proceedings/sec01/song.html.
-
(2001)
10th USENIX Security Symposium
-
-
Song, D.1
Wagner, D.2
Tian, X.3
-
22
-
-
70449690630
-
-
24/11/2008, (revised 12/01/), Unites States Computer Emergency Readiness Team (USCERT)
-
Unites States Computer Emergency Readiness Team (USCERT). Vulnerability Note VU#958563 - SSH CBC vulnerability. http://www.kb.cert.org/vuls/id/958563, 24/11/2008 (revised 12/01/2009).
-
(2009)
Vulnerability Note VU#958563 - SSH CBC Vulnerability
-
-
-
23
-
-
84947212539
-
Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
-
In L.R. Knudsen, editor, LNCS 2332, Springer-Verlag
-
S. Vaudenay. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... In L.R. Knudsen, editor, Proceedings of EUROCRYPT 2002, LNCS 2332, pp. 534-546, Springer-Verlag, 2002.
-
(2002)
Proceedings of EUROCRYPT 2002
, pp. 534-546
-
-
Vaudenay, S.1
|