Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC (2002)

by Antoine Joux , Gwenaëlle Martinet , Frederic Valette
Venue:In Proceedings of Advances in Cryptology - Crypto 2002, LNCS 2442
Citations:15 - 1 self

Active Bibliography

827 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
672 A Key-Management Scheme for Distributed Sensor Networks – Laurent Eschenauer, Virgil D. Gligor - 2002
242 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
472 Relations among notions of security for public-key encryption schemes – Mihir Bellare, David Pointcheval, Phillip Rogaway - 1998
31 A provable-security treatment of the key-wrap problem – Phillip Rogaway, Thomas Shrimpton - 2006
36 CWC: A high-performance conventional authenticated encryption mode – Tadayoshi Kohno, John Viega, Doug Whiting - 2004
23 Authenticated encryption in SSH: Provably fixing the SSH Binary Packet Protocol. Cryptology ePrint Archive, Report 2002/078 – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
7 New Blockcipher Modes of Operation with Beyond The Birthday . . . – Tetsu Iwata - 2006
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Tadayoshi Kohnoy, Chanathip Nampremprez - 2004