http://iacr.org/archive/fse2007/45930168/45930168.pdf
And of course there's ciphertext malleability attacks as it's not using authenticated encryption
http://iacr.org/archive/fse2007/45930168/45930168.pdf
And of course there's ciphertext malleability attacks as it's not using authenticated encryption