Duong et al., 2011 - Google Patents
Here come the⊕ ninjasDuong et al., 2011
View PDF- Document ID
- 1781245205865679782
- Author
- Duong T
- Rizzo J
- Publication year
- Publication venue
- Unpublished manuscript
External Links
Snippet
This paper introduces a fast blockwise chosen-plaintext attack against SSL 3.0 and TLS 1.0. We also describe one application of the attack that allows an attacker to efficiently decrypt and obtain authentication tokens embedded in HTTPS requests 1 The resulting exploits …
- 235000010956 sodium stearoyl-2-lactylate 0 abstract 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Duong et al. | Here come the⊕ ninjas | |
Bhargavan et al. | On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN | |
Kumar | Review on network security and cryptography | |
Satapathy et al. | A Comprehensive Survey on SSL/TLS and their Vulnerabilities | |
US7424615B1 (en) | Mutually authenticated secure key exchange (MASKE) | |
Wustrow et al. | {TapDance}:{End-to-Middle} Anticensorship without Flow Blocking | |
US9742806B1 (en) | Accessing SSL connection data by a third-party | |
Saxena et al. | Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication | |
US20080141020A1 (en) | Method and Apparatus for Providing Secure Streaming Data Transmission Facilities Using Unreliable Protocols | |
KR102172181B1 (en) | Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication | |
Jadin et al. | Securing multipath TCP: Design & implementation | |
Chen et al. | Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC | |
US7194621B1 (en) | Method and apparatus for encrypting data communicated between a client and a server that use an unencrypted data transfer protocol | |
Mosko et al. | Mobile sessions in content-centric networks | |
Hall-Andersen et al. | nQUIC: Noise-based QUIC packet protection | |
Keerthi | Taxonomy of SSL/TLS attacks | |
Joshi | Network security: know it all | |
Gharib et al. | Scc5g: A pqc-based architecture for highly secure critical communication over cellular network in zero-trust environment | |
Horst et al. | Breaking PPTP VPNs via RADIUS encryption | |
Limniotis et al. | Cryptography threats | |
Rastogi et al. | Enhanced authentication scheme using password integrated challenge response protocol | |
Easttom | Information assurance/encryption | |
Badra et al. | A lightweight identity authentication protocol for wireless networks | |
Vehkaoja | End-to-end encryption protocol for internet of things devices | |
Banescu et al. | Security of 3G and LTE |