Back to Results
First PageMeta Content
Malleability / Ciphertext / Block cipher / Chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext stealing / Keystream / Cryptography / Block cipher modes of operation / Initialization vector


∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky
Add to Reading List

Document Date: 2011-10-22 15:23:47


Open Document

File Size: 206,81 KB

Share Result on Facebook

City

Axis2 / New York / Chicago / /

Company

IBM / ACM Press / Intel / Microsoft / ASP.NET / the AES / W3C XML Encryption Working Group / /

Country

United States / /

Currency

pence / USD / ETB / /

/

Facility

Data Security Ruhr-University Bochum Horst Görtz Institute / Apache Rampart / Break XML Encryption Tibor Jager Juraj Somorovsky Horst Görtz Institute / /

IndustryTerm

simplified algorithms / security processing / realistic Web Service / Web Services Framework In / healthcare applications / decryption algorithm / cryptographic algorithm / healthcare / Web Service / real world Web Service framework / data processing / financial services / business communications / Web Services client / message processing / server applications / e - commerce / even other systems / inversion algorithm / real-world systems / Web Service endpoint / encryption algorithm / governmental and military applications / open source Web Services / Web Services / /

OperatingSystem

Linux / Ubuntu / /

Organization

Break XML Encryption Tibor Jager Juraj Somorovsky Horst Görtz Institute for IT Security / Data Security Ruhr-University Bochum Horst Görtz Institute for IT Security / German Federal Ministry of Education / European Commission / /

Person

Sebastian Schinzel / Robert A. van Engelen / Thorsten Holz / Stefan Wigchers / John Smith / Schwenk / Juraj Somorovsky Horst / /

Position

Code breaking General / Chair / /

Product

Apache Axis2 / OAxis / Web Service / /

ProgrammingLanguage

ASP.NET / Ruby on Rails / Java / XML Schema / XML / /

ProvinceOrState

Illinois / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Data Security Ruhr-University Bochum tibor.jager@rub.de juraj.somorovsky@rub.de ABSTRACT XML Encryption / inversion algorithm / XML / XML processor / valid encryption / 2.1 Block Ciphers The XML Encryption / Linux / encryption algorithm / block cipher / data encryption / padding algorithm / eXtensible Markup Language / The algorithm / SSL / cryptographic algorithm / Encryption / Cryptography / public key / ATTACKING XML ENCRYPTION / Java / XML Encryption / ASCII / 4.2 Character Encondings The XML Encryption / optimized algorithms / decryption algorithm / digital signature / /

SocialTag