Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC (2002)

by Antoine Joux , Gwenaëlle Martinet , Frederic Valette
Venue:In Proceedings of Advances in Cryptology - Crypto 2002, LNCS 2442
Citations:14 - 1 self

Documents Related by Co-Citation

9 Practical symmetric on-line encryption – Pierre-alain Fouque, Gwenaëlle Martinet, Guillaume Poupard - 2003
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
7 Online Encryption Schemes: New Security Notions and Constructions – A Boldyreva, N Taesombut - 2004
222 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
5 Authenticated On-Line Encryption – Pierre-alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
6 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes – Pierre-alain Fouque, Antoine Joux, Guillaume Poupard - 2004
6 Provably Fixing the SSH Binary Packet Protocol – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
61 Characterization of Security Notions for Probabilistic Private-Key Encryption – Jonathan Katz, Moti Yung - 2006
123 The order of encryption and authentication for protecting communications (or: how Secure is SSL?) – Hugo Krawczyk - 2001
119 LFSR-based hashing and authentication – H Krawczyk - 1994
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
3 Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption – G V Bard - 2007
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004