-
1
-
-
70449625225
-
Plaintext recovery attacks against SSH IEEE
-
IEEE Computer Society
-
Albrecht, M.R., Paterson, K.G., Watson, G.J.: Plaintext recovery attacks against SSH. In: IEEE Symposium on Security and Privacy, pp. 16-26. IEEE Computer Society (2009)
-
(2009)
Symposium on Security and Privacy
, pp. 16-26
-
-
Albrecht, M.R.1
Paterson, K.G.2
Watson, G.J.3
-
2
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
Malek, M., Fernandez-Medina, E., Hernando, J. (eds.) INSTICC Press
-
Bard, G.V.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: Malek, M., Fernandez-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 99-109. INSTICC Press (2006)
-
(2006)
SECRYPT
, pp. 99-109
-
-
Bard, G.V.1
-
3
-
-
38149056456
-
Blockwise-adaptive chosen-plaintext attack and online modes of encryption
-
Galbraith, S.D. (ed.) Cryptography and Coding 2007 Springer, Heidelberg
-
Bard, G.V.: Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 129-151. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4887
, pp. 129-151
-
-
Bard, G.V.1
-
4
-
-
3142623034
-
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
-
Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and Systems Security 7(2), 206-241 (2004)
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.2
, pp. 206-241
-
-
Bellare, M.1
Kohno, T.2
Namprempre, C.3
-
5
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T. (ed.) ASIACRYPT 2000 Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
84889740075
-
Security of symmetric encryption in the presence of ciphertext fragmentation. Full version of this paper
-
Boldyreva, A., Degabriele, J.P., Paterson, K.G., Stam, M.: Security of symmetric encryption in the presence of ciphertext fragmentation. Full version of this paper. Cryptology ePrint Archive (2012), http://eprint.iacr.org
-
(2012)
Cryptologye Print Archive
-
-
Boldyreva, A.1
Degabriele, J.P.2
Paterson, K.G.3
Stam, M.4
-
7
-
-
35048835232
-
Online encryption schemes: New security notions and constructions
-
Okamoto, T. (ed.) CT-RSA 2004 Springer, Heidelberg
-
Boldyreva, A., Taesombut, N.: Online Encryption Schemes: New Security Notions and Constructions. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 1-14. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 1-14
-
-
Boldyreva, A.1
Taesombut, N.2
-
8
-
-
34548805571
-
Attacking the IPsec standards in encryption-only configurations
-
IEEE Computer Society Press
-
Degabriele, J.P., Paterson, K.G.: Attacking the IPsec standards in encryption-only configurations. In: IEEE Symposium on Security and Privacy, pp. 335-349. IEEE Computer Society Press (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 335-349
-
-
Degabriele, J.P.1
Paterson, K.G.2
-
9
-
-
35048826668
-
Authenticated on-line encryption
-
Matsui, M., Zuccherato, R.J. (eds.) SAC 2003 Springer, Heidelberg
-
Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated On-line Encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3006
, pp. 145-159
-
-
Fouque, P.-A.1
Joux, A.2
Martinet, G.3
Valette, F.4
-
10
-
-
24144492130
-
Blockwise adversarial model for on-line ciphers and symmetric encryption schemes
-
Handschuh, H., Hasan, M.A. (eds.) SAC 2004 Springer, Heidelberg
-
Fouque, P.-A., Joux, A., Poupard, G.: Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 212-226. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 212-226
-
-
Fouque, P.-A.1
Joux, A.2
Poupard, G.3
-
11
-
-
0242404221
-
Practical symmetric on-line encryption
-
Johansson, T. (ed.) FSE 2003 Springer, Heidelberg
-
Fouque, P.-A., Martinet, G., Poupard, G.: Practical Symmetric On-Line Encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 362-375. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 362-375
-
-
Fouque, P.-A.1
Martinet, G.2
Poupard, G.3
-
12
-
-
38149093714
-
Blockwise-adaptive attackers: Revisiting the (In)security of some provably secure encryptionModels: CBC, GEM, IACBC
-
Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
-
Joux, A., Martinet, G., Valette, F.: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure EncryptionModels: CBC, GEM, IACBC. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 17-30
-
-
Joux, A.1
Martinet, G.2
Valette, F.3
-
13
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How Secure Is SSL)
-
Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
-
Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
14
-
-
77954650216
-
Plaintext-dependent decryption: A formal security treatment of SSH-CTR
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Paterson, K.G., Watson, G.J.: Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 345-361. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 345-361
-
-
Paterson, K.G.1
Watson, G.J.2
-
15
-
-
52149124374
-
Immunising CBC mode against padding oracle attacks: A Formal security treatment
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008 Springer, Heidelberg
-
Paterson, K.G., Watson, G.J.: Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 340-357. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 340-357
-
-
Paterson, K.G.1
Watson, G.J.2
-
16
-
-
82955189836
-
Tag size does matter: Attacks and proofs for the TLS record protocol
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
-
Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372-389. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 372-389
-
-
Paterson, K.G.1
Ristenpart, T.2
Shrimpton, T.3
-
17
-
-
35048855085
-
Nonce-based symmetric encryption
-
Roy, B., Meier, W. (eds.) FSE 2004 Springer, Heidelberg
-
Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 348-359
-
-
Rogaway, P.1
-
18
-
-
79959295332
-
On hiding a plaintext length by preencryption
-
Lopez, J., Tsudik, G. (eds.) ACNS 2011 Springer, Heidelberg
-
Tezcan, C., Vaudenay, S.: On Hiding a Plaintext Length by Preencryption. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 345-358. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6715
, pp. 345-358
-
-
Tezcan, C.1
Vaudenay, S.2
|