Padding oracle attack

Results: 21



#Item
1Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

Add to Reading List

Source URL: www.iacr.org

- Date: 2012-08-21 15:40:12
    2Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com.  DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

    Last updated March 1, 2016. For contact information, test tools, and updates, visit https://drownattack.com. DROWN: Breaking TLS using SSLv2 Nimrod Aviram1 , Sebastian Schinzel2 , Juraj Somorovsky3 , Nadia Heninger4 , M

    Add to Reading List

    Source URL: drownattack.com

    Language: English - Date: 2016-07-01 21:14:30
    3Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English - Date: 2016-01-19 07:39:30
    4Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

    Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    5Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

    Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    6Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

    Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-19 14:57:29
    7Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

    Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-10 16:37:23
    8A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

    A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2013-03-05 14:25:50