메뉴 건너뛰기




Volumn 7073 LNCS, Issue , 2011, Pages 372-389

Tag size does matter: Attacks and proofs for the TLS Record Protocol

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION LAYERS; AUTHENTICATED ENCRYPTION; DISTINGUISHING ATTACKS; IND-CCA; VARIABLE LENGTH;

EID: 82955189836     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25385-0_20     Document Type: Conference Paper
Times cited : (75)

References (27)
  • 1
    • 34547139941 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3), 395(2007)
    • (2007) J. Cryptology , vol.20 , Issue.3 , pp. 395
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T. ed., Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) ASIACRYPT 2000. LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen ciphertext security of encryption schemes
    • Boneh, D. ed., Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J. B.: Relaxing Chosen Ciphertext Security of Encryption Schemes. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Foundations of Computer Science - FOCS (2001)
    • (2001) Foundations of Computer Science - FOCS
    • Canetti, R.1
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 14
    • 82955204023 scopus 로고    scopus 로고
    • GnuTLS Documentation (2011), http://www.gnu.org/software/gnutls/ documentat.html
    • (2011) GnuTLS Documentation
  • 15
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
    • Advances in Cryptology - CRYPTO 2001
    • Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001) (Pubitemid 33317923)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 310-331
    • Krawczyk, H.1
  • 17
    • 38549143135 scopus 로고    scopus 로고
    • Cryptographic algorithm implementation requirements for encapsulating security payload (ESP) and authentication header (AH)
    • April
    • Manral, V.: Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC 4835 (April 2007), http://www.ietf.org/rfc/rfc4835.txt
    • (2007) RFC 4835
    • Manral, V.1
  • 22
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
    • Knudsen, L. R. ed., Springer, Heidelberg
    • Vaudenay, S.: Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS. In: Knudsen, L. R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534-546. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002. LNCS , vol.2332 , pp. 534-546
    • Vaudenay, S.1
  • 26
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • Wright, C., Monrose, F., Masson, G.: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research 6, 2745-2769(2006) (Pubitemid 46011489)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.