<--- Back to Details
First PageDocument Content
Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm
Date: 2016-03-22 15:58:42
Cryptography
IMessage
Chosen-ciphertext attack
Adaptive chosen-ciphertext attack
Attack model
Padding oracle attack
RSA
Messages
Block cipher mode of operation
ICloud
Authenticated encryption
Symmetric-key algorithm

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Add to Reading List

Source URL: www.cs.jhu.edu

Download Document from Source Website

File Size: 845,27 KB

Share Document on Facebook

Similar Documents

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach Samuel Jero Endadul Hoque†

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach Samuel Jero Endadul Hoque†

DocID: 1v5ML - View Document

XVIth INTERNATIONAL CIFA FORUM  REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

XVIth INTERNATIONAL CIFA FORUM REPEAL AND REPLACE AN ECONOMIC MODEL UNDER ATTACK?

DocID: 1uYNO - View Document

Mathematical Biosciences–251 www.elsevier.com/locate/mbs Effects of behavioral changes in a smallpox attack model S. Del Valle

Mathematical Biosciences–251 www.elsevier.com/locate/mbs Effects of behavioral changes in a smallpox attack model S. Del Valle

DocID: 1qvdI - View Document

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

DocID: 1pPLX - View Document