@inproceedings{2e0299460f1b4fc8a9a1ac0746b101dd,
title = "New efficient padding methods secure against padding oracle attacks",
abstract = "This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle{\textquoteright}s characteristic of checking the padding during decryption. Of the ten existing padding methods, only two (ABYT-PAD and ABIT-PAD) can withstand padding oracle attacks. However, these methods are not efficient since they either use a random number generator or require MAC verification in applications. The three new padding methods proposed in this paper are secure against padding oracle attacks and more efficient compared to the two aforementioned padding methods.",
keywords = "CBC mode of operation, Padding methods, Padding oracle attack",
author = "Kang, {Hyung Chul} and Myungseo Park and Dukjae Moon and Changhoon Lee and Jongsung Kim and Kimoon Kim and Juhyuk Kim and Seokhie Hong",
note = "Funding Information: This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant No. 2013R1A1A2059864). Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2016.; 18th International Conference on Information Security and Cryptology, ICISC 2015 ; Conference date: 25-11-2015 Through 27-11-2015",
year = "2016",
doi = "10.1007/978-3-319-30840-1_21",
language = "English",
isbn = "9783319308395",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "329--342",
editor = "Aaram Yun and Soonhak Kwon",
booktitle = "Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers",
}