-
1
-
-
35048881103
-
Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1. 2.3
-
Springer
-
P. Nguyen, "Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1. 2.3," in Advances in Cryptology-EUROCRYPT 2004. Springer, 2004, pp. 555-570.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 555-570
-
-
Nguyen, P.1
-
2
-
-
2442604821
-
Randomness and the netscape browser
-
I. Goldberg and D. Wagner, "Randomness and the Netscape Browser," Dr Dobb's Journal-Software Tools for the Professional Programmer, vol. 21, no. 1, pp. 66-71, 1996.
-
(1996)
Dr Dobb's Journal-software Tools for the Professional Programmer
, vol.21
, Issue.1
, pp. 66-71
-
-
Goldberg, I.1
Wagner, D.2
-
3
-
-
85084163781
-
Lessons learned in implementing and deploying crypto software
-
P. Gutmann, "Lessons Learned in Implementing and Deploying Crypto Software," in Proc. USENIX Security Symp, 2002, pp. 315-325.
-
(2002)
Proc. USENIX Security Symp
, pp. 315-325
-
-
Gutmann, P.1
-
4
-
-
84893988353
-
Implementation of chosen-ciphertext attacks against PGP and GnuPG
-
K. Jallad, J. Katz, and B. Schneier, "Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG," Information Security, pp. 90-101, 2002.
-
(2002)
Information Security
, pp. 90-101
-
-
Jallad, K.1
Katz, J.2
Schneier, B.3
-
5
-
-
85084164298
-
A chosen-ciphertext attack against several E-mail encryption protocols
-
USENIX Association
-
J. Katz and B. Schneier, "A Chosen-Ciphertext Attack against Several E-mail Encryption Protocols," in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, p. 18.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 18
-
-
Katz, J.1
Schneier, B.2
-
6
-
-
0033312792
-
Security in the real world: How to evaluate security technology
-
B. Schneier, "Security in the Real World: How To Evaluate Security Technology," Computer Security Journal, vol. 15, no. 4, p. 1, 1999.
-
(1999)
Computer Security Journal
, vol.15
, Issue.4
, pp. 1
-
-
Schneier, B.1
-
7
-
-
85073480054
-
The perils of unauthenticated encryption: Kerberos version 4
-
Citeseer
-
T. Yu, S. Hartman, and K. Raeburn, "The Perils of Unauthenticated Encryption: Kerberos Version 4," in Proc. NDSS, vol. 4. Citeseer, 2004.
-
(2004)
Proc. NDSS
, vol.4
-
-
Yu, T.1
Hartman, S.2
Raeburn, K.3
-
8
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
-
M. Bellare, T. Kohno, and C. Namprempre, "Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm," ACM Transactions on Information and System Security (TISSEC), vol. 7, no. 2, p. 241, 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.2
, pp. 241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
9
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm," Journal of Cryptology, vol. 21, no. 4, pp. 469-491, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
11
-
-
33746067483
-
Cryptography in theory and practice: The case of encryption in IPsec
-
4004 LNCS, DOI 10.1007/11761679-2, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
K. Paterson and A. Yau, "Cryptography in Theory and Practice: The Case of Encryption in IPsec," Advances in Cryptology-EUROCRYPT 2006, pp. 12-29, 2006. (Pubitemid 44072230)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 12-29
-
-
Paterson, K.G.1
Yau, A.K.L.2
-
13
-
-
84947212539
-
Security flaws induced by CBC padding-applications to SSL
-
Springer
-
S. Vaudenay, "Security Flaws Induced by CBC Padding-Applications to SSL," in Advances in Cryptology-EUROCRYPT 2002. Springer, 2002, pp. 534-545.
-
(2002)
Advances in Cryptology-EUROCRYPT 2002
, pp. 534-545
-
-
Vaudenay, S.1
-
14
-
-
85095110742
-
Practical padding oracle attacks
-
J. Rizzo and T. Duong, "Practical Padding Oracle Attacks," USENIX WOOT, 2010.
-
(2010)
USENIX WOOT
-
-
Rizzo, J.1
Duong, T.2
-
15
-
-
84947237328
-
On the security of joint signature and encryption
-
Springer
-
J. An, Y. Dodis, and T. Rabin, "On the Security of Joint Signature and Encryption," in Advances in Cryptology-EUROCRYPT 2002. Springer, 2002, pp. 83-107.
-
(2002)
Advances in Cryptology-EUROCRYPT 2002
, pp. 83-107
-
-
An, J.1
Dodis, Y.2
Rabin, T.3
-
16
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
-
Advances in Cryptology - CRYPTO 2001
-
H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)," in Advances in Cryptology - CRYPTO 2001. Springer, 2001, pp. 310-331. (Pubitemid 33317923)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
17
-
-
37349004156
-
NIST recommendation for block cipher modes of operation, methods and techniques
-
M. Dworkin, "NIST Recommendation for Block Cipher Modes of Operation, Methods and Techniques," NIST Special Publication.
-
NIST Special Publication
-
-
Dworkin, M.1
-
18
-
-
80052015333
-
Padding oracle attacks on the ISO CBC mode encryption standard
-
K. Paterson and A. Yau, "Padding Oracle Attacks On the ISO CBC Mode Encryption Standard," Topics in Cryptology-CT-RSA 2004, pp. 1995-1995, 2004.
-
(2004)
Topics in Cryptology-CT-RSA 2004
, pp. 1995-1995
-
-
Paterson, K.1
Yau, A.2
-
20
-
-
85177685989
-
Padding oracles everywhere
-
T. Duong and J. Rizzo, "Padding Oracles Everywhere," EKOPARTY, 2010.
-
(2010)
EKOPARTY
-
-
Duong, T.1
Rizzo, J.2
-
22
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
B. Canvel, A. Hiltgen, S. Vaudenay, and M. Vuagnoux, "Password Interception in a SSL/TLS channel," Advances in Cryptology-CRYPTO 2003, pp. 583-599, 2003. (Pubitemid 137636965)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
23
-
-
33745738582
-
Side channel attacks on CBC encrypted messages in the PKCS# 7 format
-
V. Klima and T. Rosa, "Side Channel Attacks On CBC Encrypted Messages in the PKCS# 7 Format," IACR ePrint Archive, vol. 98, p. 2003, 2003.
-
(2003)
IACR EPrint Archive
, vol.98
, pp. 2003
-
-
Klima, V.1
Rosa, T.2
-
24
-
-
85177642464
-
OpenSSL: The open source toolkit for SSL/TLS
-
Last visited
-
E. Young, T. Hudson, and R. Engelschall, "OpenSSL: The Open Source Toolkit for SSL/TLS," World Wide Web, http://www.openssl.org/, Last visited, vol. 9, 2011.
-
(2011)
World Wide Web
, vol.9
-
-
Young, E.1
Hudson, T.2
Engelschall, R.3
-
28
-
-
26444609149
-
Padding oracle attacks on CBC-mode encryption with secret and random IVs
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
A. Yau, K. Paterson, and C. Mitchell, "Padding Oracle Attacks on CBC-mode Encryption with Secret and Random IVs," in Fast Software Encryption. Springer, 2005, pp. 299-319. (Pubitemid 41425171)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 299-319
-
-
Yau, A.K.L.1
Paterson, K.G.2
Mitchell, C.J.3
-
29
-
-
0026851843
-
On message integrity in cryptographic protocols
-
Proceedings., 1992 IEEE Computer Society Symposium on. IEEE
-
S. Stubblebine and V. Gligor, "On Message Integrity in Cryptographic Protocols," in Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium on. IEEE, 2002, pp. 85-104.
-
(2002)
Research in Security and Privacy, 1992
, pp. 85-104
-
-
Stubblebine, S.1
Gligor, V.2
-
30
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
ACM
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11," in Proceedings of the 7th annual international conference on Mobile computing and networking. ACM, 2001, pp. 180-189.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
|