Semantic Scholar uses AI to extract papers important to this topic.
When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An… Expand In this paper, we consider the indistinguishability of XTS in some security models for both full final block and partial final… Expand When client contribution their passwords in a public place, they might be at danger of attackers stealing their password. An… Expand In this paper, we study a particular class of symmetric algorithms that aim to ensure confidentiality by using a functionality… Expand The threat of insiders stealing valuable corporate data continues to escalate. The inadvertent exposure of internal data has also… Expand User data on mobile devices are always transferred into Cloud for flexible and location-independent access to services and… Expand We prove the security of CBC encryption with ciphertext stealing. Our results cover all versions of ciphertext stealing recently… Expand Abstract This paper describes the importance of the XTS-AES encryption mode of operation and concludes with a new proof for the… Expand A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input… Expand