Back to Results
First PageMeta Content
Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack


The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
Add to Reading List

Document Date: 2006-11-25 00:57:52


Open Document

File Size: 211,87 KB

Share Result on Facebook

City

Haifa / /

Company

CBC / /

Country

Israel / /

/

IndustryTerm

real adversarial network / communications network / secure communications / cryptographic protocols / symmetric-key algorithms / secure key-exchange protocol / insecure protocol / secure protocol / above protocols / Web clients / communications links / resultant protocol / public networks / secure channels protocol / insecure networks / /

Organization

EtA / EE Department / European Union / Technion / /

Position

CUF-CPA / loose CUF-CPA / IND-CPA / CPA / name CUF-CPA / /

ProgrammingLanguage

C / /

Technology

Encryption / secure key-exchange protocol / cryptography / totally insecure protocol / resultant protocol / secure channels protocol / key-exchange protocol / block cipher / generic symmetric encryption / symmetric-key algorithms / secret key / secure protocol / above protocols / SSL / stream cipher / /

SocialTag