The official PGP user's guide
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Cryptanalysis of the EMD mode of operation
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Constructing rate-1 MACs from related-key unpredictable block ciphers: PGV model revisited
FSE'10 Proceedings of the 17th international conference on Fast software encryption
PolyE+CTR: a swiss-army-knife mode for block ciphers
ProvSec'11 Proceedings of the 5th international conference on Provable security
Hi-index | 0.00 |
In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease. Typically only one chosen plaintext/ciphertext query is required, while computational complexity is negligible.