透過您的圖書館登入
IP:18.218.61.16

並列摘要


In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode under the related-mode attack model. In particular, we point out that when the adversary has access to an oracle under one proper mode, then almost all other related-cipher modes, whether they are encryption modes or authentication modes or authenticated encryption modes, can be attacked with ease under the related-mode attack model.

被引用紀錄


林坤億(2011)。以改良式SHA-256為基礎之網頁內容更新管理代理人系統〔博士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2011.01164
張宗恒(2008)。寬頻垂直配向邊緣場效切換之半穿透半反射型液晶顯示器〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2008.01876

延伸閱讀