A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Kleptographic attacks on a cascade of mix servers
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
Zag órski Kleptographic Attacks on a Cascade of Mix Servers P i t=1 s t,j , K i,j,α = i t=1 k t,j,α . After performing steps (2) -( 4 ), the last clerk λ produces proto-ballots. ...
Introduction The Pr êt à Voter Protocol The Basic Version of the Attack Enhancements Conclusions
Cascades of Mix Servers In the paper we present kleptographic attacks on cascades of mix servers. ...
Zag órski Kleptographic Attacks on a Cascade of Mix Servers 1 A set of λ clerks prepares a batch of pairs of onions -both onions in each pair j are ciphertexts of the same plaintext S λ,j , the exemplary ...
doi:10.1145/1229285.1229297
dblp:conf/ccs/KubiakKZ07
fatcat:idlwahynebhkpjs56om6j53brm
A Systematic Analysis of the Juniper Dual EC Incident
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
The more sophisticated of these vulnerabilities was a passive VPN decryption capability, enabled by a change to one of the elliptic curve points used by the Dual EC pseudorandom number generator. ...
While Dual EC is known to be insecure against an attacker who can choose the elliptic curve parameters, Juniper had claimed in 2013 that ScreenOS included countermeasures against this type of attack. ...
This incident is the best prior example we have of a publicly visible cryptanalytic attack carried out by sophisticated attackers. ...
doi:10.1145/2976749.2978395
dblp:conf/ccs/CheckowayMGFC0H16
fatcat:vgx7xgnjh5bnro5kryr6qbaqi4
07311 Abstracts Collection – Frontiers of Electronic Voting
2008
Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. ...
From July the 29th to August the 3th, 2007, the Dagstuhl Seminar 07311 "Frontiers of Electronic Voting" was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. ...
Keywords: State of the Art, Technology, Elections Kleptographic Attacks on E-Voting Schemes Przemysªaw Kubiak (Institute of Mathematics & Informatics/TU Wroclaw, PL)
Joint work of: Moran, Tal; Naor, ...
doi:10.4230/dagsemproc.07311.1
fatcat:2ugkdhd2pzd3rhcabpanjk7igi
Cryptographic Primitives that Resist Backdooring and Subversion
2020
The first part of this thesis is concerned with defeating backdoors in hash functions, which are one of the most fundamental and versatile primitives in cryptography. ...
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security ...
The success of attacks on the concatenation and cascade combiners depends on the sizes of the domain and co-domain of the available hash functions. ...
doi:10.25534/tuprints-00014550
fatcat:ybdjvz3u4fenlcpqrs7rugulcu