Back to Results
First PageMeta Content
Block cipher modes of operation / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Block cipher / Symmetric-key algorithm / RSA / Stream ciphers / Ciphertext stealing / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Ciphertext


A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 118,64 KB

Share Result on Facebook

Company

O’Reilly & Associates / AES / CBC / MIT Press / John Wiley & Sons / Counterpane Internet Security Inc. / /

Currency

pence / /

/

Facility

C. Hall / Columbia University / /

IndustryTerm

Internet access / possible future solution / symmetric-key encryption algorithm / e-mail decryption software / encryption protocols / e-mail encryption protocols / Internet link / e-mail security protocols / telephone conversation / simplest solution / telephone conversations / encryption algorithms / encryption protocol / communication tool / communications medium / security protocols / Internet Electronic Mail / e-mail protocols / /

Organization

Columbia University / Department of Computer Science / MIT / European Central Bank / /

Person

Epk / Jonathan Katz∗ Bruce Schneier / Bruce Schneier† June / /

PublishedMedium

Journal of Cryptology / Theory of Computing / /

Technology

Encryption / S/MIME / Cryptography / SSL V.3.0 protocol / 2.1 E-mail Encryption Protocols / public key / encryption algorithms / encryption protocols / e-mail encryption protocols / block cipher / Message Encryption / same public-key encryption / Unforgeable Encryption / encryption protocol / security protocols / private key / symmetric-key encryption algorithm / e-mail protocols / e-mail encryption / digital signature / e-mail security protocols / /

SocialTag