메뉴 건너뛰기




Volumn 9496, Issue , 2015, Pages 94-111

Rogue decryption failures: Reconciling AE robustness notions

Author keywords

Authenticated encryption; Multiple errors; Provable security; Robustness; Unverified plaintext

Indexed keywords

AUTHENTICATION; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 84951869766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-27239-9_6     Document Type: Conference Paper
Times cited : (20)

References (18)
  • 2
    • 84916595381 scopus 로고    scopus 로고
    • How to securely release unverified plaintext in authenticated encryption
    • In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
    • Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: How to securely release unverified plaintext in authenticated encryption. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 105–125. Springer, Heidelberg (2014)
    • (2014) ASIACRYPT 2014. LNCS , vol.8873 , pp. 105-125
    • Andreeva, E.1    Bogdanov, A.2    Luykx, A.3    Mennink, B.4    Mouha, N.5    Yasuda, K.6
  • 5
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998. LNCS , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 6
    • 84905390591 scopus 로고    scopus 로고
    • On symmetric encryption with distinguishable decryption failures
    • In: Moriai, S. (ed.), Springer, Heidelberg
    • Boldyreva, A., Degabriele, J.P., Paterson, K.G., Stam, M.: On symmetric encryption with distinguishable decryption failures. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 367–390. Springer, Heidelberg (2014)
    • (2014) FSE 2013. LNCS , vol.8424 , pp. 367-390
    • Boldyreva, A.1    Degabriele, J.P.2    Paterson, K.G.3    Stam, M.4
  • 7
    • 84901277219 scopus 로고    scopus 로고
    • KDM security in the hybrid framework
    • In: Benaloh, J. (ed.), Springer, Heidelberg
    • Davies, G.T., Stam, M.: KDM security in the hybrid framework. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 461–480. Springer, Heidelberg (2014)
    • (2014) CT-RSA 2014. LNCS , vol.8366 , pp. 461-480
    • Davies, G.T.1    Stam, M.2
  • 8
    • 33646842805 scopus 로고    scopus 로고
    • A designer’s guide to KEMs
    • In: Paterson, K.G. (ed.), Springer, Heidelberg
    • Dent, A.W.: A designer’s guide to KEMs. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 133–151. Springer, Heidelberg (2003)
    • (2003) Cryptography and Coding 2003. LNCS , vol.2898 , pp. 133-151
    • Dent, A.W.1
  • 9
    • 77956996186 scopus 로고    scopus 로고
    • Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21–40. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 21-40
    • Dodis, Y.1    Pietrzak, K.2
  • 10
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society Press
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 49th FOCS, pp. 293–302. IEEE Computer Society Press (2008)
    • (2008) 49Th FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 11
    • 84942693703 scopus 로고    scopus 로고
    • Robust authenticated-encryption AEZ and the problem that it solves
    • In: Oswald, E., Fischlin, M. (eds.), Springer, Heidelberg
    • Hoang, V.T., Krovetz, T., Rogaway, P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 15–44. Springer, Heidelberg (2015)
    • (2015) EUROCRYPT 2015. LNCS , vol.9056 , pp. 15-44
    • Hoang, V.T.1    Krovetz, T.2    Rogaway, P.3
  • 12
    • 84951875474 scopus 로고    scopus 로고
    • Online authenticatedencryption and its nonce-reuse misuse-resistance
    • Hoang, V.T., Reyhanitabar, R., Rogaway, P., Vizár, D.: Online authenticatedencryption and its nonce-reuse misuse-resistance. In: Proceedings of CRYPTO (2015). http://eprint.iacr.org/2015/189
    • (2015) Proceedings of CRYPTO
    • Hoang, V.T.1    Reyhanitabar, R.2    Rogaway, P.3    Vizár, D.4
  • 13
    • 84901650552 scopus 로고    scopus 로고
    • Reconsidering generic composition
    • In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
    • Namprempre, C., Rogaway, P., Shrimpton, T.: Reconsidering generic composition. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 257–274. Springer, Heidelberg (2014)
    • (2014) EUROCRYPT 2014. LNCS , vol.8441 , pp. 257-274
    • Namprempre, C.1    Rogaway, P.2    Shrimpton, T.3
  • 14
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated-encryption with associated-data
    • Atluri, V. (ed.), ACM Press
    • Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS 2002, pp. 98–107. ACM Press (2002)
    • (2002) ACM CCS 2002 , pp. 98-107
    • Rogaway, P.1
  • 15
    • 35048855085 scopus 로고    scopus 로고
    • Nonce-based symmetric encryption
    • Roy, B., Meier,W. (eds.), Springer, Heidelberg
    • Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier,W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348–359. Springer, Heidelberg (2004)
    • (2004) FSE 2004. LNCS , vol.3017 , pp. 348-359
    • Rogaway, P.1
  • 16
    • 33746068613 scopus 로고    scopus 로고
    • A provable-security treatment of the key-wrap problem
    • In: Vaudenay, S. (ed.), Springer, Heidelberg
    • Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373–390. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 373-390
    • Rogaway, P.1    Shrimpton, T.2
  • 18
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS
    • In: Knudsen, L.R. (ed.), Springer, Heidelberg
    • Vaudenay, S.: Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534–546. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002. LNCS , vol.2332 , pp. 534-546
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.