[1] Joux A, Martinet G, Valette F. Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC[M]// Advances in Cryptology - CRYPTO 2002. Springer Berlin Heidelberg, 2002:231-248
[2] Fouque P A, Martinet G, Poupard G. Practical Symmetric On-Line Encryption[J]. Lecture Notes in Computer Science, 2003, 2887:362-375
[3] Fouque P A, Joux A, Poupard G. Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes[M]// Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004:212-226
[4] Boldyreva A, Taesombut N. Online Encryption Schemes: New Security Notions and Constructions[C]// Cryptographers’ Track at the RSA Conference. Springer, Berlin, Heidelberg, 2004:1-14
[5] Bard G V. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL[C]// International Conference on Secrypt. 2010:7--10
[6] Bard G V. Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption[C]// Ima International Conference on Cryptography and Coding. Springer-Verlag, 2007:129-151
[7] Sun Zhe-Lei, Wang Peng. Analysis of OFBNLF encryption mode of operation[J]. SCIENTIA SINICA: Informationis, 2016, 46(6):729 (in Chinese)
(孙哲蕾, 王鹏. OFBNLF加密工作模式的分析[J]. 中国科学:信息科学, 2016, 46(6):729.)
[8] Zheng Kai-Yan, Wang Peng. The concrete security of BC mode and its improvement[J]. Journal of Cyber Security, 2017, 2(3):61-78 (in Chinese)
(郑凯燕, 王鹏. BC加密模式的分析及其改进[J]. 信息安全学报, 2017, 2(3):61-78.)
[9] Bellare M, Boldyreva A, Knudsen L, et al. Online Ciphers and the Hash-CBC Construction[C]// International Cryptology Conference. Springer, Berlin, Heidelberg, 2001:292-309
[10] Nandi M. Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC[M]// Progress in Cryptology - INDOCRYPT 2008. Springer Berlin Heidelberg, 2008:350--362
[11] Rogaway P, Zhang H. Online Ciphers from Tweakable Blockciphers[M]// Topics in Cryptology – CT-RSA 2011. Springer Berlin Heidelberg, 2011:237-249
[12] Bhaumik R, Nandi M. Olef: an inverse-free online cipher. an online SPRP with an optimal inverse-free construction. IACR Trans. Symmetric Cryptol., 2016, 2016(2):30–51
[13] Fleischmann E, Forler C, Lucks S. McOE: A Foolproof On-Line Authenticated Encryption Scheme[J]. Lecture Notes in Computer Science, 2011, 2011:196-215
[14] Andreeva E, Bogdanov A, Luykx A, et al. Parallelizable and Authenticated Online Ciphers[M]// Advances in Cryptology - ASIACRYPT 2013. Springer Berlin Heidelberg, 2013:424-443
[15] Hoang V T, Reyhanitabar R, Rogaway P, et al. Online Authenticated -Encryption and its Nonce-Reuse Misuse-Resistance[M]// Advances in Cryptology -- CRYPTO 2015. Springer Berlin Heidelberg, 2015:493-517
[16] Endignoux G, Vizár D. Linking online misuse-resistant authenticated encryption and blockwise attack models. IACR Trans. Symmetric Cryptol., 2016, 2016(2):125–144
[17] Andreeva E, Bogdanov A, Luykx A, et al. How to Securely Release Unverified Plaintext in Authenticated Encryption[J]. Lecture Notes in Computer Science, 2014, 8873:105-125
[18] Chakraborti A, Datta N, Nandi M. INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes[C]// Rsa Conference on Topics in Cryptology - Ct-Rsa. Springer-Verlag New York, Inc. 2016:39-54
[19] Datta N, Luykx A, Mennink B, Nandi M. Understanding RUP integrity of COLM. IACR Trans. Symmetric Cryptol., 2017, 2017(2):143-161
[20] Abed F, Forler C, List E, et al. RIV for Robust Authenticated Encryption[M]// Fast Software Encryption. Springer Berlin Heidelberg, 2016:23-42
[21] Ashur T, Dunkelman O, Luykx A. Boosting Authenticated Encryption Robustness with Minimal Modifications[C]// International Cryptology Conference. Springer, Cham, 2017:3-33
[22] Zhang P, Wang P, Hu H, et al. INT-RUP Security of Checksum-Based Authenticated Encryption[M]// Provable Security. 2017:147-166
[23] Vaudenay S. Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS…[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2002:534-545
[24] Canvel B, Hiltgen A, Vaudenay S, et al. Password Interception in a SSL/TLS Channel[C]// International Cryptology Conference. Springer, Berlin, Heidelberg, 2003:583-599
[25] Rizzo J, Duong T. Practical padding oracle attacks[C]// Usenix Conference on Offensive Technologies. 2010:1-8
[26] Iwata T, Kurosawa K. OMAC: One-Key CBC MAC[J]. Pre-proceedings of Fast Software Encryption, FSE 2003, 2003, 20(1):129-153
[27] Yuan Z, Wang W, Jia K, et al. New Birthday Attacks on Some MACs Based on Block Ciphers[C]// Advances in Cryptology - CRYPTO 2009, International Cryptology Conference, Santa Barbara, Ca, Usa, August 16-20, 2009. Proceedings. DBLP, 2009:209-230
[28] Jia K, Wang X, Yuan Z, et al. Distinguishing and Second-Preimage Attacks on CBC-Like MACs[C]// International Conference on Cryptology and Network Security. Springer-Verlag, 2009:349-361
[29] Bhargavan K. On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN[C]// ACM Sigsac Conference on Computer and Communications Security. ACM, 2016:456-467
|