4 Hits in 1.3 sec

Kleptographic attacks on a cascade of mix servers

Przemysław Kubiak, Mirosław Kutyłowski, Filip Zagórski
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
Zag órski Kleptographic Attacks on a Cascade of Mix Servers P i t=1 s t,j , K i,j,α = i t=1 k t,j,α . After performing steps (2) -( 4 ), the last clerk λ produces proto-ballots.  ...  Introduction The Pr êt à Voter Protocol The Basic Version of the Attack Enhancements Conclusions Cascades of Mix Servers In the paper we present kleptographic attacks on cascades of mix servers.  ...  Zag órski Kleptographic Attacks on a Cascade of Mix Servers 1 A set of λ clerks prepares a batch of pairs of onions -both onions in each pair j are ciphertexts of the same plaintext S λ,j , the exemplary  ... 
doi:10.1145/1229285.1229297 dblp:conf/ccs/KubiakKZ07 fatcat:idlwahynebhkpjs56om6j53brm

A Systematic Analysis of the Juniper Dual EC Incident

Stephen Checkoway, Hovav Shacham, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
The more sophisticated of these vulnerabilities was a passive VPN decryption capability, enabled by a change to one of the elliptic curve points used by the Dual EC pseudorandom number generator.  ...  While Dual EC is known to be insecure against an attacker who can choose the elliptic curve parameters, Juniper had claimed in 2013 that ScreenOS included countermeasures against this type of attack.  ...  This incident is the best prior example we have of a publicly visible cryptanalytic attack carried out by sophisticated attackers.  ... 
doi:10.1145/2976749.2978395 dblp:conf/ccs/CheckowayMGFC0H16 fatcat:vgx7xgnjh5bnro5kryr6qbaqi4

07311 Abstracts Collection – Frontiers of Electronic Voting

David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan
Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper.  ...  From July the 29th to August the 3th, 2007, the Dagstuhl Seminar 07311 "Frontiers of Electronic Voting" was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl.  ...  Keywords: State of the Art, Technology, Elections Kleptographic Attacks on E-Voting Schemes Przemysªaw Kubiak (Institute of Mathematics & Informatics/TU Wroclaw, PL) Joint work of: Moran, Tal; Naor,  ... 
doi:10.4230/dagsemproc.07311.1 fatcat:2ugkdhd2pzd3rhcabpanjk7igi

Cryptographic Primitives that Resist Backdooring and Subversion

Sogol Mazaheri
The first part of this thesis is concerned with defeating backdoors in hash functions, which are one of the most fundamental and versatile primitives in cryptography.  ...  The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security  ...  The success of attacks on the concatenation and cascade combiners depends on the sizes of the domain and co-domain of the available hash functions.  ... 
doi:10.25534/tuprints-00014550 fatcat:ybdjvz3u4fenlcpqrs7rugulcu