[go: up one dir, main page]

Duong et al., 2011 - Google Patents

Here come the⊕ ninjas

Duong et al., 2011

View PDF
Document ID
1781245205865679782
Author
Duong T
Rizzo J
Publication year
Publication venue
Unpublished manuscript

External Links

Snippet

This paper introduces a fast blockwise chosen-plaintext attack against SSL 3.0 and TLS 1.0. We also describe one application of the attack that allows an attacker to efficiently decrypt and obtain authentication tokens embedded in HTTPS requests 1 The resulting exploits …
Continue reading at hpc-notes.soton.ac.uk (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Duong et al. Here come the⊕ ninjas
Bhargavan et al. On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN
Kumar Review on network security and cryptography
Satapathy et al. A Comprehensive Survey on SSL/TLS and their Vulnerabilities
US7424615B1 (en) Mutually authenticated secure key exchange (MASKE)
Wustrow et al. {TapDance}:{End-to-Middle} Anticensorship without Flow Blocking
US9742806B1 (en) Accessing SSL connection data by a third-party
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
US20080141020A1 (en) Method and Apparatus for Providing Secure Streaming Data Transmission Facilities Using Unreliable Protocols
KR102172181B1 (en) Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication
Jadin et al. Securing multipath TCP: Design & implementation
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
US7194621B1 (en) Method and apparatus for encrypting data communicated between a client and a server that use an unencrypted data transfer protocol
Mosko et al. Mobile sessions in content-centric networks
Hall-Andersen et al. nQUIC: Noise-based QUIC packet protection
Keerthi Taxonomy of SSL/TLS attacks
Joshi Network security: know it all
Gharib et al. Scc5g: A pqc-based architecture for highly secure critical communication over cellular network in zero-trust environment
Horst et al. Breaking PPTP VPNs via RADIUS encryption
Limniotis et al. Cryptography threats
Rastogi et al. Enhanced authentication scheme using password integrated challenge response protocol
Easttom Information assurance/encryption
Badra et al. A lightweight identity authentication protocol for wireless networks
Vehkaoja End-to-end encryption protocol for internet of things devices
Banescu et al. Security of 3G and LTE