Oracle attack

Results: 62



#Item
1Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

Add to Reading List

Source URL: www.iacr.org

- Date: 2012-08-21 15:40:12
    2Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com.  DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

    Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

    Add to Reading List

    Source URL: drownattack.com

    Language: English - Date: 2016-07-01 21:14:30
    3SOLUTION BRIEF  Your Cloud Servers Are Under Attack. How Can You Tell? Instant visibility & active security, anywhere, at any scale. THE VISIBILITY CHALLENGE

    SOLUTION BRIEF Your Cloud Servers Are Under Attack. How Can You Tell? Instant visibility & active security, anywhere, at any scale. THE VISIBILITY CHALLENGE

    Add to Reading List

    Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

    Language: English - Date: 2016-05-25 17:45:06
    4Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

    Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2008-07-20 11:55:06
    5Angelo Prado Neal Harris Yoel Gluck SSL, GONE

    Angelo Prado Neal Harris Yoel Gluck SSL, GONE

    Add to Reading List

    Source URL: breachattack.com

    Language: English - Date: 2013-08-05 21:32:24
    6Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

    Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-04-19 19:54:55
      7Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

      Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

      Add to Reading List

      Source URL: tls.mbed.org

      Language: English - Date: 2016-01-19 07:39:30
      8Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1  IBM Research – Zurich, Switzerland

      Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

      Add to Reading List

      Source URL: www.neven.org

      Language: English - Date: 2012-04-18 06:08:49
      9Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

      Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

      Add to Reading List

      Source URL: certicrypt.gforge.inria.fr

      Language: English - Date: 2013-06-17 13:32:36