Back to Results
First PageMeta Content
Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack


One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]
Add to Reading List

Document Date: 2013-04-11 09:39:21


Open Document

File Size: 496,88 KB

Share Result on Facebook

Company

Oracle / OCBC / XML Signature / CBC / XML Encryption Working Group / Web Services / ASP.NET / the AES / /

/

Facility

State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute / University of London kenny.paterson@rhul.ac.uk Juraj Somorovsky† Horst G¨ortz Institute / /

IndustryTerm

suitable key derivation algorithms / enterprise software / to certain applications / secure protocols / malicious protocols / symmetric encryption algorithm / weak encryption algorithm / Web Encryption In / mobile telecommunications system / technology development path / decryption algorithm / important cryptographic Web standards / sound solution / secure algorithm / web server responding / exhaustive search / stronger algorithm / public-key encryption algorithm / cryptographic protocols / Web Signature / Web Signature Nimbus-JWT / cryptographic algorithms / encryption algorithms / banking / certain practical applications / signature algorithms / Web Encryption / weak cryptographic algorithms / important Web standards / cryptographic protocol / encryption algorithm / /

Movie

H / /

NaturalFeature

mount Bleichenbacher / /

Organization

European Central Bank / University of London kenny.paterson@rhul.ac.uk Juraj Somorovsky† Horst G¨ortz Institute / German Federal Ministry of Education / Cryptography Tibor Jager Horst G¨ortz Institute / /

Person

Kenneth G. Paterson / /

Position

author / /

Product

Key Wrap / /

ProgrammingLanguage

ASP.NET / Java / R / C / XML / /

Technology

RSA-based algorithms / XML / three algorithms / symmetric encryption algorithm / mode encryption / encryption algorithms / JSON / encryption algorithm / stronger A5/1 algorithm / RSA encryption / cryptographic protocol / block cipher / usually hybrid encryption / Extensible Markup Language / private key / secret key / Key Wrap algorithm / executed algorithm / GCM-based encryption / weak cryptographic algorithms / SSL / PKCS#1v1.5 encryption / suitable key derivation algorithms / weak encryption algorithm / stronger algorithm / Encryption / Counter-mode encryption / secure algorithm / PKCS#1 encryption / RSA-PKCS#1 v1.5 encryption / Cryptography / two-party protocols / public key / Java / public-key encryption algorithm / signing algorithm / RSA-OAEP encryption / public-key encryption / non-interactive protocols / SSL protocol / PKCS#1 v2.0 encryption / weak algorithm / GSM / decryption algorithm / digital signature / GCM-decryption algorithm / cryptographic algorithms / web server / stream cipher / PKCS#1 v1.5 encryption / RSA-based encryption / signature algorithms / /

SocialTag