共 15 条
[1]
Plaintext Recovery Attacks Against SSH
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:16-26
[2]
Bellare M., 2004, ACM Transactions on Information and Systems Security, V7, P206, DOI 10.1145/996943.996945
[3]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[4]
Canvel B, 2003, LECT NOTES COMPUT SC, V2729, P583
[5]
DAI W, 2002, ATTACK SSH2 PROTOCOL
[6]
On the (In)Security of IPsec in MAC-then-Encrypt Configurations
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:493-504
[9]
KOHNO T, 2004, ACM C COMP COMM SEC, P72
[10]
Krawczyk Hugo., 2001, Advances in Cryptology-CRYPTO, V2139, P310