Skip to search formSkip to main contentSkip to account menu

Padding oracle attack

Known as: Padding oracle, Oracle (disambiguation), CBC padding oracle 
In cryptography, a padding oracle attack is an attack which is performed using the padding of a cryptographic message. In cryptography, variable… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The quality control of hardfacing is one of the areas where non-destructive testing is applied. To detect defects and… 
2017
2017
Filtering is an important issue in signals and images processing. Many images and videos are compressed using discrete cosine… 
2015
2015
In the various application environments on the internet, we use verified cipher algorithm to protect personal information. Even… 
2013
2013
Multicarrier schemes are supported to high data rate. Orthogonal Frequency Division Multiplexing (OFDM) and Filtered Multi-Tone… 
2013
2013
In the past decade, Padding Oracle Attacks (POAs) have become a major threat to PKCS#1 v1.5. Although the updated scheme (OAEP… 
2012
2012
Different guard interval techniques for the Orthogonal Frequency Division Multiplexing (OFDM) transmission are suggested to… 
2008
2008
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped… 
2002
2002
Single-carrier block transmission (SCBT) DS-CDMA, also known as chip-interleaved block-spread (CIBS) CDMA, is an interesting… 
2002
2002
The technique Private Information Retrieval (PIR) perfectly protects a user's access pattern to a database. An attacker cannot… 
1995
1995
Data from frontal crash tests involving a Ford Taurus in various configurations were examined: (1) to characterize the dynamic…