نتایج جستجو برای: zero padding

تعداد نتایج: 150601  

2017
Bipin Kumar

Nonwovens play an important and crucial role in the designing of appropriate struc‐ tures for healthcare and hygiene products. One such application is the use of nonwo‐ ven padding in a multi-layer compression system recommended for the treatment of chronic venous disorders. Padding helps in ensuring uniform pressure distribution underneath the bandaging layer wrapped around the circumference o...

Journal: :Inf. Sec. Techn. Report 1999
David Naccache

This paper presents a non-technical overview of the the recent attacks against RSA encryption and signature standards. It is intended as both a system design aid and a temporary reference text beginning at a level suitable for engineers, risk managers and system architects with no or little previous exposure to padding attacks. We have used a straightforward approach to the essential consequenc...

Journal: :IACR Cryptology ePrint Archive 2003
Vlastimil Klíma Tomás Rosa

Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3] scheme allows an attacker to invert the underlying block cipher, provided she has access to a valid-padding oracle which for each input ciphertext tells her whether the corresponding plaintext has a valid padding or not. Having on mind the countermeasures against this attack, different padding s...

1996
Don Coppersmith

We show how to solve a polynomial equation (mod N ) of degree k in a single variable z, as long as there is a solution smaller than “Ik. We give two applications to RSA encryption with exponent 3. First, knowledge of all the ciphertext and 2/3 of the plaintext bits for a single message reveals that message. Second, if messages are padded with truly random padding and then encrypted with an expo...

2003
H. T. Kung Chen-Mou Cheng Koan-Sin Tan Scott O. Bradner

This paper describes an IP-layer anonymizing infrastructure , called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anonymity, ANON uses a network resident set of IP-layer anonymizing forwarders that can forward IP packets with nested encryption and decryption applied to their source and destination addresses. To prevent adversaries from compr...

Wireless communication is the major form of connection nowadays. In most cases it exploits the benefits of the spread spectrum techniques to overcome channel introduced corruptions like Doppler residual frequency, noise, interference and jamming. These techniques also enhance the security and quality of the link. Using long spreading pseudo-noise codes provides further security for the link tho...

2005
Arnold K. L. Yau Kenneth G. Paterson Chris J. Mitchell

In [8], Paterson and Yau presented padding oracle attacks against a committee draft version of a revision of the ISO CBC-mode encryption standard [3]. Some of the attacks in [8] require knowledge and manipulation of the initialisation vector (IV). The latest draft of the revision of the standard [4] recommends the use of IVs that are secret and random. This obviates most of the attacks of [8]. ...

2001
Dan Boneh

Optimal Asymmetric Encryption Padding (OAEP) is a technique for converting the RSA trapdoor permutation into a chosen ciphertext secure system in the random oracle model. OAEP padding can be viewed as two rounds of a Feistel network. We show that for the Rabin and RSA trapdoor functions a much simpler padding scheme is sufficient for chosen ciphertext security in the random oracle model. We sho...

2011
Cihangir Tezcan Serge Vaudenay

It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its precise value. Some standards such as TLS or SSH offer to do it by applying some pad-then-encrypt techniques. In this study, we investigate the information leakage when these techniques are used. We define the notion o...

2009
Eike Kiltz Krzysztof Pietrzak

We investigate the security of “padding-based” encryption schemes in the standard model . This class contains all public-key encryption schemes where the encryption algorithm first applies some invertible public transformation to the message (the “padding”), followed by a trapdoor permutation. In particular, this class contains OAEP and its variants. Our main result is a black-box impossibility...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید