{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:41Z","timestamp":1772283641972,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540406747","type":"print"},{"value":"9783540451464","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_34","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T17:51:19Z","timestamp":1277229079000},"page":"583-599","source":"Crossref","is-referenced-by-count":93,"title":["Password Interception in a SSL\/TLS Channel"],"prefix":"10.1007","author":[{"given":"Brice","family":"Canvel","sequence":"first","affiliation":[]},{"given":"Alain","family":"Hiltgen","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Vuagnoux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"ISO\/IEC 10116, Information Processing \u2014 Modes of Operation for an n-bit Block Cipher Algorithm. International Organization for Standardization, Geneva, Switzerland (1991)"},{"key":"34_CR2","unstructured":"Wireless Transport Layer Security. Wireless Application Protocol WAP-261-WTLS-20010406-a. Wireless Application Protocol Forum (2001), http:\/\/www.wapforum.org\/"},{"key":"34_CR3","unstructured":"FIPS 46-3, Data Encryption Standard (DES). U.S. Department of Commerce \u2014 National Institute of Standards and Technology. Federal Information Processing Standard Publication 46-3 (1999)"},{"key":"34_CR4","unstructured":"FIPS 81, DES Modes of Operation. U.S. Department of Commerce \u2014 National Bureau of Standards, National Technical Information Service, Springfield, Virginia. Federal Information Processing Standards 81 (1980)"},{"key":"34_CR5","unstructured":"English Word List Elcomsoft Co. Ltd, http:\/\/www.elcomsoft.com"},{"key":"34_CR6","unstructured":"Black, J., Urtubia, H.: Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. In: Proceedings of the 11th Usenix UNIX Security Symposium, San Francisco, California, USA, USENIX (2002)"},{"key":"34_CR7","unstructured":"Brumley, D., Boneh, D.: Remote Timing Attacks are Practical. To appear in Proceedings of the 12th Usenix UNIX Security Symposium, USENIX (2003)"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Crispin, M.: Internet Message Access Protocol - Version 4. RFC 1730, standard tracks, University of Washington (1994)","DOI":"10.17487\/rfc1730"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246, standard tracks, the Internet Society (1999)","DOI":"10.17487\/rfc2246"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP Authentication: Basic and Digest Access Authentication. Internet standard. RFC 2617, the Internet Society (1999)","DOI":"10.17487\/rfc2617"},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-39200-9_2","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"P. Junod","year":"2003","unstructured":"Junod, P.: On the Optimality of Linear, Differential and Sequential Distinguishers. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 17\u201332. Springer, Heidelberg (2003)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"34_CR13","unstructured":"M\u00f6ller, B.: Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures (2002), http:\/\/www.openssl.org\/~bodo\/tls-cbc.txt"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Newman, C.: Using TLS with IMAP, POP3 and ACAP. RFC 2595, standard tracks, the Internet Society (1999)","DOI":"10.17487\/rfc2595"},{"key":"34_CR15","volume-title":"Sequential Analysis \u2014 Tests and Confidence Intervals","author":"D. Siegmund","year":"1985","unstructured":"Siegmund, D.: Sequential Analysis \u2014 Tests and Confidence Intervals. Springer, Heidelberg (1985)"},{"key":"34_CR16","unstructured":"Ricca, M.: The Denver Projet - A Combination of ARP and DNS Spoofing. Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, LASEC, Semester Project (2002), http:\/\/lasecwww.epfl.ch"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S. Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security Flaws Induced by CBC Padding \u2014 Applications to SSL, IPSEC, WTLS.. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 534\u2013545. Springer, Heidelberg (2002)"},{"key":"34_CR18","unstructured":"Vuagnoux, M.: CBC PAD Attack against IMAP over TLS. omen. Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, LASEC, Semester Project (2003), http:\/\/omen.vuagnoux.com"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:52:02Z","timestamp":1559195522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}