ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
- 27 August 2020
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- A Surfeit of SSH Cipher SuitesPublished by Association for Computing Machinery (ACM) ,2016
- Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLSPublished by Springer Science and Business Media LLC ,2016
- Lucky Thirteen: Breaking the TLS and DTLS Record ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- How to break XML encryptionPublished by Association for Computing Machinery (ACM) ,2011
- Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NETPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- On the (in)security of IPsec in MAC-then-encrypt configurationsPublished by Association for Computing Machinery (ACM) ,2010
- Recommendation for block cipher modes of operation :Published by National Institute of Standards and Technology (NIST) ,2010
- Plaintext Recovery Attacks against SSHPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Attacking the IPsec Standards in Encryption-only ConfigurationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Buffer overflows: attacks and defenses for the vulnerability of the decadePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002