A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
Zag órski Kleptographic Attacks on a Cascade of Mix Servers P i t=1 s t,j , K i,j,α = i t=1 k t,j,α . After performing steps (2) -( 4 ), the last clerk λ produces proto-ballots. ... Introduction The Pr êt à Voter Protocol The Basic Version of the Attack Enhancements Conclusions Cascades of Mix Servers In the paper we present kleptographic attacks on cascades of mix servers. ... Zag órski Kleptographic Attacks on a Cascade of Mix Servers 1 A set of λ clerks prepares a batch of pairs of onions -both onions in each pair j are ciphertexts of the same plaintext S λ,j , the exemplary ...doi:10.1145/1229285.1229297 dblp:conf/ccs/KubiakKZ07 fatcat:idlwahynebhkpjs56om6j53brm
The more sophisticated of these vulnerabilities was a passive VPN decryption capability, enabled by a change to one of the elliptic curve points used by the Dual EC pseudorandom number generator. ... While Dual EC is known to be insecure against an attacker who can choose the elliptic curve parameters, Juniper had claimed in 2013 that ScreenOS included countermeasures against this type of attack. ... This incident is the best prior example we have of a publicly visible cryptanalytic attack carried out by sophisticated attackers. ...doi:10.1145/2976749.2978395 dblp:conf/ccs/CheckowayMGFC0H16 fatcat:vgx7xgnjh5bnro5kryr6qbaqi4
Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. ... From July the 29th to August the 3th, 2007, the Dagstuhl Seminar 07311 "Frontiers of Electronic Voting" was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. ... Keywords: State of the Art, Technology, Elections Kleptographic Attacks on E-Voting Schemes Przemysªaw Kubiak (Institute of Mathematics & Informatics/TU Wroclaw, PL) Joint work of: Moran, Tal; Naor, ...doi:10.4230/dagsemproc.07311.1 fatcat:2ugkdhd2pzd3rhcabpanjk7igi
The first part of this thesis is concerned with defeating backdoors in hash functions, which are one of the most fundamental and versatile primitives in cryptography. ... The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security ... The success of attacks on the concatenation and cascade combiners depends on the sizes of the domain and co-domain of the available hash functions. ...doi:10.25534/tuprints-00014550 fatcat:ybdjvz3u4fenlcpqrs7rugulcu