Lines Matching refs:plaintext
105 ciphertexts to recover the plaintext through a timing oracle attack.
698 could be sufficient for an attacker to recover the plaintext. A local
1869 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
2691 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused
2789 plaintext after repeated timing measurements under some conditions.
3446 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
3669 partially recover the plaintext of messages under some conditions by
3683 plaintext of messages under some conditions by using a cache attack
3693 to partially recover the plaintext of messages under some conditions (see
3875 * Return the plaintext data more quickly on unpadded CBC decryption, as