Authenticated encryption

Results: 182



#Item
111Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
112Applied mathematics / Ciphertext indistinguishability / Public-key cryptography / Semantic security / RSA / Cipher / ID-based encryption / Probabilistic encryption / Authenticated encryption / Cryptography / Cyberwarfare / Security

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-24 01:51:53
113Secure Shell / Cryptographic protocols / Block cipher modes of operation / Stream cipher / OpenSSH / Padding / Block cipher / Authenticated encryption / Ciphertext / Cryptography / Electronic commerce / Cryptographic software

Plaintext Recovery Attacks Against SSH Martin R. Albrecht, Kenneth G. Paterson and Gaven J. Watson Information Security Group Royal Holloway, University of London Egham, Surrey, UK Email: {m.r.albrecht,kenny.paterson,g.w

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-03-30 15:26:46
114Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-04-11 09:39:21
115Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
116Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:04:44
117Padding / Block cipher / Cipher / Authenticated encryption / Transport Layer Security / Ciphertext stealing / Cryptography / Ciphertext indistinguishability / RSA

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol Kenneth G. Paterson1 , Thomas Ristenpart2 , and Thomas Shrimpton3 1 Information Security Group, Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-11-29 05:36:51
118Ciphertext indistinguishability / Advantage / Block cipher / Ciphertext / Cyberwarfare / Applied mathematics / Secrecy / Cryptography / Block cipher modes of operation / Authenticated encryption

The Associated-Data Problem

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:33:09
119Authenticated encryption / OCB mode / Cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Block cipher modes of operation / Block cipher

OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:34:11
120Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:25:51
UPDATE