Filters








12 Hits in 12.5 sec

Return Of Bleichenbacher's Oracle Threat (ROBOT)

Hanno Böck, Juraj Somorovsky, Craig Young
2018 Zenodo  
In 1998 Bleichenbacher presented an adaptive chosen-ciphertext attack on the RSA PKCS~#1~v1.5 padding scheme.  ...  The attack exploits the availability of a server which responds with different messages based on the ciphertext validity.  ...  Acknowledgments The authors thank Tibor Jager for providing a Python implementation of the Bleichenbacher attack, Adam Langley for feedback on QUIC and timing problems in Go TLS, Eric Mill from GSA for  ... 
doi:10.5281/zenodo.3610288 fatcat:cqu5bd5nlndota5nlgl5gnwgiq

The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10

Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020 Transactions on Cryptographic Hardware and Embedded Systems  
In this paper, we analyze SCP10, which is the Secure Channel Protocol (SCP) that relies on RSA for key exchange and authentication. Our findings are twofold.  ...  First, we demonstrate several flaws in the design of SCP10.  ...  We would like to thank Gil Bernabeu, the Technical Director of GlobalPlatform, for his responsiveness regarding the identified vulnerabilities.  ... 
doi:10.13154/tches.v2020.i3.196-218 dblp:journals/tches/BragaFS20 fatcat:dh5cieht2jcfdojvyz4nujsbl4

Proofing Direct-Seeded Rice with Better Root Plasticity and Architecture

Siddharth Panda, Prasanta Kumar Majhi, Annamalai Anandan, Anumalla Mahender, Sumanth Veludandi, Debendranath Bastia, Suresh Babu Guttala, Shravan Kumar Singh, Sanjoy Saha, Jauhar Ali
2021 International Journal of Molecular Sciences  
In this review, we tried to mine the available research information on the direct-seeded rice (DSR) root system to highlight the requirements of different root traits such as root architecture, length,  ...  number, density, thickness, diameter, and angle that play a pivotal role in determining the uptake of nutrients and moisture at different stages of plant growth.  ...  The authors would like to thank those who participated in the internal review of the manuscript at the International Rice Research Institute for improving it through valuable suggestions and much effort  ... 
doi:10.3390/ijms22116058 fatcat:pipgu2kfbzbwranthtdjom7q54

Fault Injection Resilience

Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane
2010 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography  
Most of the resistance techniques to perturbation attacks have relied so far on the detection of faults. We present in this paper another strategy, based on the resilience against fault attacks.  ...  Fault injections constitute a major threat to the security of embedded systems.  ...  ACKNOWLEDGMENTS The authors are very grateful to the five anonymous reviewers, that all contributed to improve the paper and to better place it in its scientific context.  ... 
doi:10.1109/fdtc.2010.15 dblp:conf/fdtc/GuilleySDS10 fatcat:ayekwd6trfadxo7d5isrnke6wy

ARCHANGEL Galaxy Photometry System [article]

J. Schombert
2007 arXiv   pre-print
As a proof of concept, we preform a re-analysis of the 2MASS Large Galaxy Atlas to demonstrate the differences in an automated pipeline, with its emphasis on speed, versus this package with an emphasis  ...  To this end, a new galaxy photometry system has been developed (mostly building on tools and techniques that have existed in the community for decades) that combines ease of usage with a mixture of pre-built  ...  Fig. 4 . 4 -A high contrast zoom-in of the 2MASS J image of NGC 157, a face-on Sc(s) galaxy selected from the RSA catalog.  ... 
arXiv:astro-ph/0703646v1 fatcat:byda4pizojhr7lodz4cwc2dru4

Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation [article]

David Kaloper-Mersinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell, T Holz, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, J Jung
2019
Transport Layer Security (TLS) implementations have a history of security flaws.  ...  The immediate causes of these are often programming errors, e.g. in memory management, but the root causes are more fundamental: the challenges of interpreting the ambiguous prose specification, the complexities  ...  of the block size in CBC mode, or the use of RSA keys unsuitably small for a message).  ... 
doi:10.17863/cam.41243 fatcat:sq7jezrivbco3fffplmyb6x4yy

Systematic Evaluations Of Security Mechanism Deployments

Sze Yiu Chau
2019
In this dissertation, we systematically evaluate implementations of security mechanisms that are deployed in the wild.  ...  Finally, we study the verification of RSA signatures, as specified in the PKCS#1 v1.5 standard, which is widely used in many security-critical network protocols.  ...  Despite the existence of newer schemes with provable security like RSA-PSS introduced in the version 2.0 specification [RFC8017], the version 1.5 standard continues to be extensively used in the Web PKI  ... 
doi:10.25394/pgs.9037817 fatcat:c62pusqmdjacpgq2cwcdonvcvi

A Privacy Preserving Framework For Cyber-Physical Systems And Its Integration In Real World Applications

Haodong Wang
2009
In addition to security and privacy, Snoogle also incorporates a number of energy saving and communication compression techniques that are carefully designed for systems composed of low-cost, low-power  ...  The evaluation study comprises of the real world experiments on a prototype Snoogle system and the scalability simulations.  ...  The popular padding schemes include Optimal Asymmetric Encryption Padding (OAEP) and Probabilistic Signature Scheme for RSA (RSA-PSS).  ... 
doi:10.21220/s2-75t7-bw53 fatcat:ql24svjaifhhjlzlkoewzohe6m

Measuring psychotic depression

S. D. Østergaard, B. S. Meyers, A. J. Flint, B. H. Mulsant, E. M. Whyte, C. M. Ulbricht, P. Bech, A. J. Rothschild
2013 Acta Psychiatrica Scandinavica  
Methods: We performed a cohort study (n=21,439) based on self-reported questionnaire data from the Danish survey "How Are You?".  ...  Children with parents free of IBD were the comparison cohort.  ...  in the wild type.  ... 
doi:10.1111/acps.12165 pmid:23799875 pmcid:PMC3819398 fatcat:laus7nv3kjdmhb54qwmigtuk2u

Frequency of injuries and health status of football players in Bosnia; classification by gender and age

Ratko Peric, Radojka Peric
2013 Zenodo  
METHODS: Research was conducted at the Institute for Sport and Occupational Medicine in Banja Luka, Bosnia in time period of one year.  ...  Therefore, the aim of this study was to analyze the health status of Football players in Bosnia and how it affects different genders and age groups.  ...  The MOGESS Organizational Model, included in the FMSI PSS/PSS-D Plan, must be incorporated in all the stadia and must be integrated with the existing General Security Plan, arranged with Sport Clubs through  ... 
doi:10.5281/zenodo.4575221 fatcat:gps3ldi3crhmhjxoandbui77je

Genomics-based Security Protocols: From Plaintext to Cipherprotein

Harry Shaw, Sayed Hussein, Hermann Helgert
unpublished
The evolving nature of the internet will require continual advances in authentication and confidentiality protocols.  ...  It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile ad hoc networks. It is targeted for applications without an available public key infrastructure.  ...  ACKNOWLEDGMENT Thanks to the NASA Space Network, NASA/GSFC Exploration and Space Communications Projects Division, and the NASA Space Communications and Navigation Program office for supporting this research  ... 
fatcat:53wu77jihjhcxg6xdtcxyhql3m

Local Organizing Committees [chapter]

2005 Proceedings of the Twentieth International Cryogenic Engineering Conference (ICEC20)  
New research could be developed in this area, expanding the limits of the paper that deals with one specific operation and with one specific decision.  ...  ACKNOWLEDGMENTS The author is grateful to Maria Inês Faé, professor from Federal University of Espírito Santo and great friend, who encouraged him to write about the subject and deepen in researching about  ...  One way to sign the resulting message w is to use the Bellare-Rogaway recipe, PSS-R [2] , for signing messages using RSA [3] with message recovery.  ... 
doi:10.1016/b978-008044559-5/50002-8 fatcat:hgtll22pt5duvguzik5qx6fxwm