Author:
Boldyreva Alexandra,Degabriele Jean Paul,Paterson Kenneth G.,Stam Martijn
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Albrecht, M.R., Paterson, K.G., Watson, G.J.: Plaintext recovery attacks against SSH. In: IEEE Symposium on Security and Privacy, pp. 16–26. IEEE Computer Society (2009)
2. AlFardan, N.J., Paterson, K.G.: Plaintext-recovery attacks against datagram TLS. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS 2012)
3. AlFardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: IEEE Symposium on Security and Privacy 2013. http://www.isg.rhul.ac.uk/tls/TLStiming.pdf (To appear)
4. Lecture Notes in Computer Science;A Bauer,2010
5. Bellare, M., Desai, A., Jokipii, E., Rogaway. P.: A concrete security treatment of symmetric encryption. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), pp. 394–403. IEEE (1997)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels;Advances in Cryptology – CRYPTO 2022;2022
2. Hiding the Lengths of Encrypted Messages via Gaussian Padding;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
3. A Message Franking Channel;Information Security and Cryptology;2021
4. Partition Oracles from Weak Key Forgeries;Cryptology and Network Security;2021
5. A Novel CCA Attack Using Decryption Errors Against LAC;Lecture Notes in Computer Science;2019