On symmetric encryption with distinguishable decryption failures
From MaRDI portal
Publication:2946887
DOI10.1007/978-3-662-43933-3_19zbMATH Open1321.94044OpenAlexW2122144036MaRDI QIDQ2946887FDOQ2946887
Authors: Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_19
Recommendations
Cites Work
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Monte Carlo Methods for Index Computation (mod p)
- A Pseudorandom Generator from any One-way Function
- Modular Multiplication Without Trial Division
- Speeding up bipartite modular multiplication
- Title not available (Why is that?)
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Elliptic Curve Cryptosystems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Four-dimensional Gallant-Lambert-Vanstone scalar multiplication
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- Title not available (Why is that?)
- Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field
- Title not available (Why is that?)
- Fast Software Encryption
- Title not available (Why is that?)
- Breaking and provably repairing the SSH authenticated encryption scheme
- Title not available (Why is that?)
- On symmetric encryption with distinguishable decryption failures
- Plaintext-dependent decryption: a formal security treatment of SSH-CTR
- Advances in Cryptology - CRYPTO 2003
- Tag size does matter: attacks and proofs for the TLS record protocol
- Title not available (Why is that?)
- Title not available (Why is that?)
- Authenticated-encryption with padding: a formal security treatment
- On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption
Cited In (13)
- A message franking channel
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Hidden shift quantum cryptanalysis and implications
- On symmetric encryption with distinguishable decryption failures
- Security of symmetric encryption in the presence of ciphertext fragmentation
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- Partition oracles from weak key forgeries
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- RIV for robust authenticated encryption
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Advances in Cryptology - CRYPTO 2003
- Simulatable channels: extended security that is universally composable and easier to prove
This page was built for publication: On symmetric encryption with distinguishable decryption failures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946887)