搜索结果: 1-11 共查到“军事学 chosen plaintext”相关记录11条 . 查询时间(0.042 秒)
A Chosen Plaintext Attack on Offset Public Permutation Mode
symmetric cryptography block cipher mode of operation authenticated encryption
2018/4/20
Offset Public Permutation Mode (OPP) by Granger et al. is a one-pass authenticated encryption scheme supporting associated data (AEAD scheme). Leveraging an error in analysis of the scheme, a chosen p...
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
public-key cryptography / Public-key encryption deterministic encryption randomness extraction.
2013/4/18
Bellare, Boldyreva, and O'Neill (CRYPTO '07) initiated the study of deterministic public-key encryption as an alternative in scenarios where randomized encryption has inherent drawbacks. The resulting...
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
public-key cryptography / RSA OAEP padding-based encryption lossy trapdoor functions leftover hash lemma standard model
2012/3/23
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash ({\em i.e.}, round) ...
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
public-key cryptography / RSA OAEP padding-based encryption lossy trapdoor functions leftover hash lemma standard model
2012/3/23
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash ({\em i.e.}, round) ...
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
public key encryption scheme plaintext ciphertext attacks
2009/6/9
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding
open problem of "circular encryption," by presenting a public key encryption scheme
and proving that it...
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
WAKE Stream Cipher Cryptanalysis
2009/4/16
Stream ciphers are an important class of encryption algorithms, which are widely used in practice.
In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintex...
Vulnerability of SSL to Chosen-Plaintext Attack
Chosen Plaintext Attack SSL/TLS Cryptanalysis
2009/3/26
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over
the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use
of the cipher bloc...
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Blockwise-Adaptive Attack Encryption Schemes Chosen-Plaintext
2008/12/12
Blockwise-adaptive chosen-plaintext and chosen-ciphertext attack are new models for cryptanalytic adversaries, first discovered by Joux, et al [JMV02], and describe a vulnerability in SSH discovered b...
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Blockwise-Adaptive Attack Encryption Schemes Chosen-Plaintext Attack
2008/12/11
Blockwise-adaptive chosen-plaintext and chosen-ciphertext attack are new models for cryptanalytic adversaries, first discovered by Joux, et al [JMV02], and describe a vulnerability in SSH discovered b...
A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL
Blockwise Adaptive Chosen Plaintext Attack (CPA) Secure Sockets Layer (SSL) Transport Layer Security
2008/11/14
This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guesse...