Format Oracles on OpenPGP
暂无分享,去创建一个
Florian Maury | Jean-René Reinhard | Olivier Levillain | Henri Gilbert | O. Levillain | H. Gilbert | Jean-René Reinhard | F. Maury
[1] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[2] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[3] Jonathan Katz,et al. Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG , 2002, ISC.
[4] Graham Steel,et al. Efficient Padding Oracle Attacks on Cryptographic Hardware , 2012, IACR Cryptol. ePrint Arch..
[5] Chris J. Mitchell,et al. Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? , 2005, ISC.
[6] Tibor Jager,et al. How to break XML encryption , 2011, CCS '11.
[7] Robert J. Zuccherato,et al. An Attack on CFB Mode Encryption as Used by OpenPGP , 2005, Selected Areas in Cryptography.
[8] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[9] Vlastimil Klíma,et al. Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format , 2003, IACR Cryptol. ePrint Arch..
[10] Kenneth G. Paterson,et al. On Symmetric Encryption with Distinguishable Decryption Failures , 2013, FSE.
[11] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.
[12] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[13] Serge Vaudenay,et al. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , 2002, EUROCRYPT.
[14] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[15] Kenneth G. Paterson,et al. Plaintext-Recovery Attacks Against Datagram TLS , 2012, NDSS.
[16] Bodo Möller,et al. This POODLE Bites: Exploiting The SSL 3.0 Fallback , 2014 .
[17] Andrey Bogdanov,et al. How to Securely Release Unverified Plaintext in Authenticated Encryption , 2014, ASIACRYPT.
[18] Kenneth G. Paterson,et al. Plaintext Recovery Attacks against SSH , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[20] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.