Oracle attack

Results: 62



#Item
41Block cipher / Espionage / Cyberwarfare / Science / Cryptography / Padding oracle attack / Padding

Practical Padding Oracle Attacks Juliano Rizzo Thai Duong Black Hat Europe, 2010

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2010-06-01 02:07:22
42Oracle / Cryptography / Padding oracle attack / Padding

Padding Oracles Everywhere T. Duong1 J. Rizzo2 1 VNSEC/HVA

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2010-09-27 22:48:26
43Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
44Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
45Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
46Java platform / Computer network security / Java / Vulnerability / Attack / Computer security / Application programming interface / Computing / Cross-platform software / Computing platforms

Security Vulnerability Notice SE[removed]ORACLE-5 [Security vulnerabilities in Java SE, Issue 32] DISLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2013-01-13 06:42:15
47Computer network security / Computing / Hacking / Vulnerability / Security testing / Attack / Oracle Corporation / Web application security scanner / Software testing / Computer security / Cyberwarfare

Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013

Add to Reading List

Source URL: www.fnr.lu

Language: English - Date: 2013-12-18 09:56:19
48Cross-site request forgery / Archive formats / Transport Layer Security / Gzip / LZ77 and LZ78 / Oracle Corporation / Barbara Gordon / DEFLATE / Data compression / Computing / Software

BREACH: REVIVING THE CRIME ATTACK ´ YOEL GLUCK, NEAL HARRIS, AND ANGELO (ANGEL) PRADO Contents

Add to Reading List

Source URL: breachattack.com

Language: English - Date: 2013-08-16 15:19:46
49Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
50Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE