scientific article; zbMATH DE number 1302834
From MaRDI portal
Publication:4249316
zbMATH Open0931.94017MaRDI QIDQ4249316FDOQ4249316
Authors: Daniel Bleichenbacher
Publication date: 8 August 1999
Title of this publication is not available (Why is that?)
Recommendations
Cited In (62)
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Fully malicious authenticated PIR
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol
- Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- On CCA-Secure Somewhat Homomorphic Encryption
- Practical Chosen Ciphertext Secure Encryption from Factoring
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
- Attacking RSA-based sessions in SSL/TLS.
- Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption
- Title not available (Why is that?)
- A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
- On the security of distributed multiprime RSA
- Attacks and security proofs of EAX-prime
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Authenticated confidential channel establishment and the security of TLS-DHE
- A Modular Security Analysis of the TLS Handshake Protocol
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- Title not available (Why is that?)
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus
- Title not available (Why is that?)
- Strengthening Security of RSA-OAEP
- On symmetric encryption with distinguishable decryption failures
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- On the joint security of encryption and signature in EMV
- How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Chosen ciphertext attack on ZHFE
- Practical cryptanalysis of ISO 9796-2 and EMV signatures
- Partition oracles from weak key forgeries
- Tightness subtleties for multi-user PKE notions
- Post-challenge leakage in public-key encryption
- Triggering parametric-down conversion-based quantum key distribution via radiation field
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- A public key cryptoscheme using bit-pairs with provable semantical security
- Universally Composable Security Analysis of TLS
- Instantiability of RSA-OAEP under chosen-plaintext attack
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- The TLS handshake protocol: A modular analysis
- CCA security and trapdoor functions via key-dependent-message security
- A semantically secure public key cryptoscheme using bit-pair shadows
- A public key cryptosystem based on three new provable problems
- On Quantum Chosen-Ciphertext Attacks and Learning with Errors
- On the CCA compatibility of public-key infrastructure
- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
- CPA-to-CCA transformation for KDM security
- Practical chosen ciphertext secure encryption from factoring
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- New attacks on PKCS\#1 V1.5 encryption
- Naor-Yung paradigm with shared randomness and applications
- Naor-Yung Paradigm with Shared Randomness and Applications
- Tag-KEM/DEM: A new framework for hybrid encryption
- Title not available (Why is that?)
- Indifferentiability for public key cryptosystems
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249316)