搜索结果: 1-15 共查到“plaintext”相关记录36条 . 查询时间(0.203 秒)
Plaintext Recovery Attacks against XTS Beyond Collisions
XTS Storage encryption Mode of operation
font style='font-size:12px;'>
2019/7/17
XTS is an encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway's XEX tweakable block cipher and is known to be secure up to the collisions between the blocks, th...
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
anonymity applications election schemes
font style='font-size:12px;'>
2019/1/16
Non-malleable asymmetric encryption schemes which prove plaintext knowledge are sufficient for secrecy in some domains. For example, ballot secrecy in voting. In these domains, some applications deriv...
Plaintext Recovery Attack of OCB2
OCB2 plaintext recovery attack chosen plaintext
font style='font-size:12px;'>
2018/11/12
Inoue and Minematsu [Cryptology ePrint Archive: Report 2018/1040] presented efficient forgery attacks against OCB2, and Poettering [Cryptology ePrint Archive: Report 2018/1087] presented a distinguish...
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
font style='font-size:12px;'>
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
A Chosen Plaintext Attack on Offset Public Permutation Mode
symmetric cryptography block cipher mode of operation authenticated encryption
font style='font-size:12px;'>
2018/4/20
Offset Public Permutation Mode (OPP) by Granger et al. is a one-pass authenticated encryption scheme supporting associated data (AEAD scheme). Leveraging an error in analysis of the scheme, a chosen p...
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
font style='font-size:12px;'>
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
side-channel analysis differential plaintext attack
font style='font-size:12px;'>
2017/12/1
Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to their low implementation footprint. In this paper, we present a novel Side-Channel Assisted Different...
Ciphertext and Plaintext Leakage Reveals the Entire TDES Key
DES SCA DPA
font style='font-size:12px;'>
2016/12/15
SCA(Side-channel analysis) is a well-known method to recover the sensitive data stored in security products. Meanwhile numerous countermeasures for hardware implementation of cryptographic algorithms ...
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
Hill Cipher Zero-plaintext Attack Chaotic Map
font style='font-size:12px;'>
2016/12/10
Hill Cipher is a symmetric cryptosystem that was claimed to suffer from known-plaintext attack for many years. Different methods have been proposed to make this cipher more secure against known attack...
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
differential power analysis side-channel attack leakage-resilient encryption
font style='font-size:12px;'>
2016/12/7
Differential power analysis (DPA) is a powerful tool to extract the key of a cryptographic implementation from observing its power consumption during the en-/decryption of many different inputs. There...
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
public key encryption key encapsulation mechanism chosen ciphertext security
font style='font-size:12px;'>
2016/3/4
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure
public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a security
property calle...
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
group signatures verifiable controllable linkability non-interactive plaintext (in-)equality proofs
font style='font-size:12px;'>
2016/2/23
Group signatures are an important privacy-enhancing tool
that allow to anonymously sign messages on behalf of a group. A recent
feature for group signatures is controllable linkability, where a dedi...
How to Securely Release Unverified Plaintext in Authenticated Encryption
Plaintext Awareness Plaintext Extractor CAESAR Competition
font style='font-size:12px;'>
2016/1/25
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes unavoidable in
practice, such...
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Authenticated Key Exchange Encryption Scheme Plaintext-Checking Attack
font style='font-size:12px;'>
2016/1/8
Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now considered
the de facto security notion for public-key encryption. However, the security guarantee that it
offers is som...
Plaintext Recovery Attacks Against WPA/TKIP
secret-key cryptography
font style='font-size:12px;'>
2014/3/6
We conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with specific key bytes being set to kno...