Chosen-ciphertext attack

Results: 243



#Item
41

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
42

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:31
43This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
44

PDF Document

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
45Dierential Cryptanalysis of DES-like Cryptosystems Eli Biham  Adi Shamir

Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2012-10-14 17:28:33
46Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-10 20:13:35
47Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 16:37:23
48Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-30 18:34:48
49An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:52:37
50Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53