A Challenging But Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL (2006)

Cached

Download Links

by Gregory V. Bard
Venue:SECRYPT 2006, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SET'UBAL
Citations:13 - 1 self

Active Bibliography

The Security of Ciphertext Stealing – Phillip Rogaway, Mark Wooding, Haibin Zhang
Authenticated Streamwise On-line Encryption ∗ – Patrick P. Tsang, Rouslan V. Solomakhin, Sean W. Smith - 2009
6 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes – Pierre-alain Fouque, Antoine Joux, Guillaume Poupard - 2004
9 Vulnerability of SSL to Chosen-Plaintext Attack – Gregory V. Bard - 2004
10 Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.”In – Kenneth G. Paterson, Gaven J. Watson - 2010
2 Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization – Chanathip Namprempre - 2002
On the Impossibility of Strong Encryption over – Raphael C. -w. Phan, Serge Vaudenay, Loughborough Uni U. K
Online Ciphers from Tweakable Blockciphers – Phillip Rogaway, Haibin Zhang
22 Plaintext recovery attacks against SSH – Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson - 2009
10 Concealment and its applications to authenticated encryption – Yevgeniy Dodis, Jee Hea An - 2003
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack – Gregory V. Bard - 2006
4 A Survey of Confidential Data Storage and Deletion Methods – Sarah M Diesburg, An-i Andy Wang
6 Less is more: Relaxed yet composable security notions for key exchange, 2012. eprint http://eprint.iacr – C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. C. Williams
14 Blockwise-Adaptive Attackers - Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC – Antoine Joux, Gwenaëlle Martinet, Frederic Valette - 2002
14 On-Line Ciphers and the Hash-CBC constructions – M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre - 2001
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
22 Authenticated encryption in SSH: Provably fixing the SSH Binary Packet Protocol. Cryptology ePrint Archive, Report 2002/078 – Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre - 2002
9 Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol – Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton
Some Fixes To SSH – Xu Zijie