메뉴 건너뛰기




Volumn 7237 LNCS, Issue , 2012, Pages 682-699

Security of symmetric encryption in the presence of ciphertext fragmentation

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; DENIAL OF SERVICE ATTACKS; EFFICIENT CONSTRUCTION; REAL-WORLD SCENARIO; SECURITY MODEL; SYMMETRIC ENCRYPTION; SYMMETRIC ENCRYPTION SCHEMES;

EID: 84859982564     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29011-4_40     Document Type: Conference Paper
Times cited : (26)

References (18)
  • 2
    • 77954095439 scopus 로고    scopus 로고
    • A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
    • Malek, M., Fernandez-Medina, E., Hernando, J. (eds.) INSTICC Press
    • Bard, G.V.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: Malek, M., Fernandez-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 99-109. INSTICC Press (2006)
    • (2006) SECRYPT , pp. 99-109
    • Bard, G.V.1
  • 3
    • 38149056456 scopus 로고    scopus 로고
    • Blockwise-adaptive chosen-plaintext attack and online modes of encryption
    • Galbraith, S.D. (ed.) Cryptography and Coding 2007 Springer, Heidelberg
    • Bard, G.V.: Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 129-151. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4887 , pp. 129-151
    • Bard, G.V.1
  • 4
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
    • Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and Systems Security 7(2), 206-241 (2004)
    • (2004) ACM Transactions on Information and Systems Security , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 5
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T. (ed.) ASIACRYPT 2000 Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 84889740075 scopus 로고    scopus 로고
    • Security of symmetric encryption in the presence of ciphertext fragmentation. Full version of this paper
    • Boldyreva, A., Degabriele, J.P., Paterson, K.G., Stam, M.: Security of symmetric encryption in the presence of ciphertext fragmentation. Full version of this paper. Cryptology ePrint Archive (2012), http://eprint.iacr.org
    • (2012) Cryptologye Print Archive
    • Boldyreva, A.1    Degabriele, J.P.2    Paterson, K.G.3    Stam, M.4
  • 7
    • 35048835232 scopus 로고    scopus 로고
    • Online encryption schemes: New security notions and constructions
    • Okamoto, T. (ed.) CT-RSA 2004 Springer, Heidelberg
    • Boldyreva, A., Taesombut, N.: Online Encryption Schemes: New Security Notions and Constructions. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 1-14. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 1-14
    • Boldyreva, A.1    Taesombut, N.2
  • 8
    • 34548805571 scopus 로고    scopus 로고
    • Attacking the IPsec standards in encryption-only configurations
    • IEEE Computer Society Press
    • Degabriele, J.P., Paterson, K.G.: Attacking the IPsec standards in encryption-only configurations. In: IEEE Symposium on Security and Privacy, pp. 335-349. IEEE Computer Society Press (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 335-349
    • Degabriele, J.P.1    Paterson, K.G.2
  • 9
    • 35048826668 scopus 로고    scopus 로고
    • Authenticated on-line encryption
    • Matsui, M., Zuccherato, R.J. (eds.) SAC 2003 Springer, Heidelberg
    • Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated On-line Encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3006 , pp. 145-159
    • Fouque, P.-A.1    Joux, A.2    Martinet, G.3    Valette, F.4
  • 10
    • 24144492130 scopus 로고    scopus 로고
    • Blockwise adversarial model for on-line ciphers and symmetric encryption schemes
    • Handschuh, H., Hasan, M.A. (eds.) SAC 2004 Springer, Heidelberg
    • Fouque, P.-A., Joux, A., Poupard, G.: Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 212-226. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3357 , pp. 212-226
    • Fouque, P.-A.1    Joux, A.2    Poupard, G.3
  • 11
    • 0242404221 scopus 로고    scopus 로고
    • Practical symmetric on-line encryption
    • Johansson, T. (ed.) FSE 2003 Springer, Heidelberg
    • Fouque, P.-A., Martinet, G., Poupard, G.: Practical Symmetric On-Line Encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 362-375. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2887 , pp. 362-375
    • Fouque, P.-A.1    Martinet, G.2    Poupard, G.3
  • 12
    • 38149093714 scopus 로고    scopus 로고
    • Blockwise-adaptive attackers: Revisiting the (In)security of some provably secure encryptionModels: CBC, GEM, IACBC
    • Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
    • Joux, A., Martinet, G., Valette, F.: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure EncryptionModels: CBC, GEM, IACBC. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 17-30
    • Joux, A.1    Martinet, G.2    Valette, F.3
  • 13
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How Secure Is SSL)
    • Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
    • Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 14
    • 77954650216 scopus 로고    scopus 로고
    • Plaintext-dependent decryption: A formal security treatment of SSH-CTR
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Paterson, K.G., Watson, G.J.: Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 345-361. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 345-361
    • Paterson, K.G.1    Watson, G.J.2
  • 15
    • 52149124374 scopus 로고    scopus 로고
    • Immunising CBC mode against padding oracle attacks: A Formal security treatment
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008 Springer, Heidelberg
    • Paterson, K.G., Watson, G.J.: Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 340-357. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 340-357
    • Paterson, K.G.1    Watson, G.J.2
  • 16
    • 82955189836 scopus 로고    scopus 로고
    • Tag size does matter: Attacks and proofs for the TLS record protocol
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
    • Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372-389. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 372-389
    • Paterson, K.G.1    Ristenpart, T.2    Shrimpton, T.3
  • 17
    • 35048855085 scopus 로고    scopus 로고
    • Nonce-based symmetric encryption
    • Roy, B., Meier, W. (eds.) FSE 2004 Springer, Heidelberg
    • Rogaway, P.: Nonce-Based Symmetric Encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3017 , pp. 348-359
    • Rogaway, P.1
  • 18
    • 79959295332 scopus 로고    scopus 로고
    • On hiding a plaintext length by preencryption
    • Lopez, J., Tsudik, G. (eds.) ACNS 2011 Springer, Heidelberg
    • Tezcan, C., Vaudenay, S.: On Hiding a Plaintext Length by Preencryption. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 345-358. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6715 , pp. 345-358
    • Tezcan, C.1    Vaudenay, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.