Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC (2002)

by Antoine Joux , Gwenaëlle Martinet , Frederic Valette
Venue:In Proceedings of Advances in Cryptology - Crypto 2002, LNCS 2442
Citations:15 - 1 self

Documents Related by Co-Citation

361 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
9 Practical symmetric on-line encryption – Pierre-alain Fouque, Gwenaëlle Martinet, Guillaume Poupard - 2003
1200 Probabilistic Encryption – S Goldwasser, S Micali - 1984
2524 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
225 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
7 Online Encryption Schemes: New Security Notions and Constructions – A Boldyreva, N Taesombut - 2004
2765 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
643 How t o construct random func- tions – O Goldreich, S Goldwasser, S Micali - 1984
483 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996