Filters








95,235 Hits in 2.9 sec

Protocol interactions and the chosen protocol attack [chapter]

John Kelsey, Bruce Schneier, David Wagner
<span title="">1998</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we discuss such interactions between protocols, and present a new attack, called the chosen protocol attack, in which an attacker may write a new protocol using the same key material as  ...  a target protocol, which is individually very strong, but which interacts with the target protocol in a security-relevant way.  ...  Acknowledgements The authors wish to thank Ross Anderson, Susan Langford, Mark Lomas, James Riordan, Paul Syverson, and all those who made comments during and after the presentation at SPW'97 for their  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028162">doi:10.1007/bfb0028162</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wluztw2yffb6hdatb5svsfzile">fatcat:wluztw2yffb6hdatb5svsfzile</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829175009/https://www.schneier.com/academic/paperfiles/paper-chosen-protocol.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e0/a2/e0a2842cbdefde4ad1096ce6681b82ddb1b65a3b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028162"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An efficient and provably secure RFID grouping proof protocol

Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo
<span title="">2017</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nrbqwmcfv5fqlf7iirylnesvlm" style="color: black;">Proceedings of the Australasian Computer Science Week Multiconference on - ACSW &#39;17</a> </i> &nbsp;
Our protocol is proven secure and narrowstrong private.  ...  Our protocol is proven secure and narrow-strong private.  ...  The protocols are proved to be impersonation attack resistant and narrowstrong private. As [16] pointed out, however, whether the protocols are secure against MITM attacks is not clear.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3014812.3014885">doi:10.1145/3014812.3014885</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acsw/ChengVMS17.html">dblp:conf/acsw/ChengVMS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lopg43babrf5nd2t5qchxkjygi">fatcat:lopg43babrf5nd2t5qchxkjygi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720083201/http://ro.uow.edu.au/cgi/viewcontent.cgi?article=7519&amp;context=eispapers" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/3d/7d3d3d953eafb57cb8b5a6fe3d34759f938702d4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3014812.3014885"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Distributed Trust Diffusion Protocol for Ad Hoc Networks

Michel Morvan, Sylvain Sene
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jc6naowwnfhvvhldetedtxcble" style="color: black;">2006 International Conference on Wireless and Mobile Communications (ICWMC&#39;06)</a> </i> &nbsp;
Simulations have been realized to validate the robustness of this protocol against three kinds of attacks: simple coalitions, Trojan attacks and detonator attacks.  ...  In this paper, we propose and evaluate a distributed protocol to manage trust diffusion in ad hoc networks.  ...  Table 2 : Comparison of Trudi and the β-protocol after coalition attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icwmc.2006.3">doi:10.1109/icwmc.2006.3</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icwmc/MorvanS06.html">dblp:conf/icwmc/MorvanS06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kvvyiyaftnb5tl7cyhpn4yd6ly">fatcat:kvvyiyaftnb5tl7cyhpn4yd6ly</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170924185323/https://hal.archives-ouvertes.fr/hal-00353071/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/47/1b47df6272872b99d1756c6cf41e182cfc1ec897.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icwmc.2006.3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Distributed Trust Diffusion Protocol for Ad Hoc Networks [article]

Michel Morvan
<span title="2009-01-21">2009</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Simulations have been realized to validate the robustness of this protocol against three kinds of attacks: simple coalitions, Trojan attacks and detonator attacks.  ...  In this paper, we propose and evaluate a distributed protocol to manage trust diffusion in ad hoc networks.  ...  At each interaction, an edge has a probability of 1 9900 to be chosen (the interactions from i to j and from j to i are differentiated).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0901.3199v1">arXiv:0901.3199v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hgkzruhsxvdjhez6zjnp32uq2q">fatcat:hgkzruhsxvdjhez6zjnp32uq2q</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-0901.3199/0901.3199.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0901.3199v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptanalysis of a suite of deniable authentication protocols

R.W. Zhu, D.S. Wong, C.H. Lee
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/64g2ddfw6bhmnktwtxqy44u534" style="color: black;">IEEE Communications Letters</a> </i> &nbsp;
In 2001, Deng et al. proposed two deniable authentication protocols under the communication model defined by Aumann and Rabin in 1998.  ...  In this paper, we show that these two protocols have a common issue which incurs vulnerability to the person-in-the-middle (PIM) attack. We also propose a modification method for solving the problem.  ...  Hence for any integer t ≥ 2, a secure protocol of this type is PIM attack resilience if the success probability of the PIM attack is negligible in c and the value of c can be chosen to be arbitrarily large  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcomm.2006.1638630">doi:10.1109/lcomm.2006.1638630</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ggk6a55xbbizj752iqurrmfzy">fatcat:3ggk6a55xbbizj752iqurrmfzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090419130314/http://www.cs.cityu.edu.hk:80/~duncan/papers/06zhuetal_deniable.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/ce/bece25b21c04f9840e7e5a12083a2f2cf0e650f4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcomm.2006.1638630"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The security of the FDH variant of Chaum's undeniable signature scheme

W. Ogata, K. Kurosawa, Swee-Huay Heng
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/niovmjummbcwdg4qshgzykkpfu" style="color: black;">IEEE Transactions on Information Theory</a> </i> &nbsp;
We then classify the security of the FDH variant of Chaum's undeniable signature scheme according to three dimensions, the goal of adversaries, the attacks and the ZK level of confirmation and disavowal  ...  In particular, we prove that the security of the FDH variant of Chaum's scheme with NIZK confirmation and disavowal protocols is equivalent to the CDH problem, as opposed to the GDH problem as claimed  ...  In the active FI attack, the adversary has additional power, i.e. to execute confirmation and disavowal protocols interactively with the signer.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tit.2006.872853">doi:10.1109/tit.2006.872853</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/usgq3uf42vdy7gzzsvpfz7lfii">fatcat:usgq3uf42vdy7gzzsvpfz7lfii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150423055844/http://www.iacr.org/cryptodb/archive/2005/PKC/3480/3480.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/2c/b72c5be079fd11bbb9c70d9d0e08a340865d8fc1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tit.2006.872853"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The Security of the FDH Variant of Chaum's Undeniable Signature Scheme [chapter]

Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We then classify the security of the FDH variant of Chaum's undeniable signature scheme according to three dimensions, the goal of adversaries, the attacks and the ZK level of confirmation and disavowal  ...  In particular, we prove that the security of the FDH variant of Chaum's scheme with NIZK confirmation and disavowal protocols is equivalent to the CDH problem, as opposed to the GDH problem as claimed  ...  In the active FI attack, the adversary has additional power, i.e. to execute confirmation and disavowal protocols interactively with the signer.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30580-4_23">doi:10.1007/978-3-540-30580-4_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/66akybw2j5bijacvruqptaumai">fatcat:66akybw2j5bijacvruqptaumai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150423055844/http://www.iacr.org/cryptodb/archive/2005/PKC/3480/3480.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/2c/b72c5be079fd11bbb9c70d9d0e08a340865d8fc1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30580-4_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Active attack against HB+: a provably secure lightweight authentication protocol

H. Gilbert, M. Robshaw, H. Sibert
<span title="">2005</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5njumqonprdi3jwzrhnh22m7pm" style="color: black;">Electronics Letters</a> </i> &nbsp;
The HB + authentication protocol was recently proposed [1] and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB + .  ...  It is worth noting that while the attacker interacts with both the tag and the reader, this is done in an unintrusive manner.  ...  First we provide an outline of the LPN problem and the HB and HB + protocols. In the following section we describe the attack and assess its cost.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/el:20052622">doi:10.1049/el:20052622</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/66qjexf4mjbwln25swisimdza4">fatcat:66qjexf4mjbwln25swisimdza4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705143322/http://eprint.iacr.org/2005/237.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/35/25/35258b0a871a2dba6e661097bfcb351f2c687c3f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/el:20052622"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Universal Composability Notion for Functional Encryption Schemes

Rifki Sadikin, YoungHo Park, KilHoum Park, SangJae Moon
<span title="2013-06-30">2013</span> <i title="The Korea Society of Industrial Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lckna3eytzdyfjj3yya2wi5fs4" style="color: black;">Journal of the Korea Industrial Information Systems Research</a> </i> &nbsp;
The proof used a method that showing for any environment algorithm, it can not distinguish ideal world where the attacker play with ideal functionality   and real world where the attacker play a fully  ...  We show that UC security notion of functional encryption scheme   is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack.  ...  encryption with adaptive chosen ciphertext attacker.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9723/jksiis.2013.18.3.017">doi:10.9723/jksiis.2013.18.3.017</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/enanmtybgney3cmmmohzt72af4">fatcat:enanmtybgney3cmmmohzt72af4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170824034825/http://ocean.kisti.re.kr/downfile/volume/ksiis/SOJBB3/2013/v18n3/SOJBB3_2013_v18n3_17.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/45/0445291ce54e6d281ec19163eae807984a786a3a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9723/jksiis.2013.18.3.017"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Server-Aided Verification Signature with Privacy for Mobile Computing

Lingling Xu, Jin Li, Shaohua Tang, Joonsang Baek
<span title="">2015</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer.  ...  With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection.  ...  Acknowledgments This work is partially supported by the National Natural  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/626415">doi:10.1155/2015/626415</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dpnh37tlvjbslnqdz75lcntjii">fatcat:dpnh37tlvjbslnqdz75lcntjii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200305123618/https://ro.uow.edu.au/cgi/viewcontent.cgi?article=1797&amp;context=eispapers1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e5/e5/e5e5dc5d008959b92c7bba6672252881ec8151ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/626415"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A New Privacy-Enhanced Matchmaking Protocol

Ji Sun SHIN, Virgil D. GLIGOR
<span title="">2013</span> <i title="Institute of Electronics, Information and Communications Engineers (IEICE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4dhg4rk2rzdyfllkpx64b2rq6a" style="color: black;">IEICE transactions on communications</a> </i> &nbsp;
We define an adversary model, which captures the key security properties of privacy-enhanced matchmaking, and show that a simple, practical protocol derived by a two-step transformation of a password-based  ...  authenticated key exchange counters adversary attacks in a provable manner (in the standard model of cryptographic security).  ...  Two random users U 0 and U 1 are selected from U and a random wish w is chosen from W. 2. If b = 0, A is given an interaction with U 0 who is running the protocol on input w.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transcom.e96.b.2049">doi:10.1587/transcom.e96.b.2049</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kdslwt2i25guhofquxyzxlyt2u">fatcat:kdslwt2i25guhofquxyzxlyt2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120925025410/http://www.isoc.org/isoc/conferences/ndss/08/papers/01_new_privacy_enhanced.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/37/2d374f1a2adb88c342ff0050865e3749214627de.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transcom.e96.b.2049"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

3-Move Undeniable Signature Scheme [chapter]

Kaoru Kurosawa, Swee-Huay Heng
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, by separating these two notions, we show the first 3-move confirmation and disavowal protocols for Chaum's undeniable signature scheme which is secure against active and concurrent attacks  ...  Our main observation is that while the signer has one public key and one secret key, there exist two witnesses in the confirmation and disavowal proofs of Chaum's scheme.  ...  The difference between active and concurrent attacks is that in an active attack, the adversary interacts serially with the prover "clones"; while in a concurrent attack, the adversary is allowed to interact  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11426639_11">doi:10.1007/11426639_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vibatuwiqvhznhf3xtbyzx4cke">fatcat:vibatuwiqvhznhf3xtbyzx4cke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810104441/https://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2534/2534.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/eb/b6eb9859622dce04dca1ac57430d2b5a8b79b3a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11426639_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Integrating Diffie–Hellman Key Exchange into the Digital Signature Algorithm (DSA)

L. Harn, M. Mehta, W.-J. Hsin
<span title="">2004</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/64g2ddfw6bhmnktwtxqy44u534" style="color: black;">IEEE Communications Letters</a> </i> &nbsp;
However, the protocol was attacked by Nyberg et al. We propose three different protocols that securely integrate DH key exchange into DSA for authenticated key distribution.  ...  The National Institute of Standards and Technology (NIST) has published a series of security standards under Federal Information Processing Standard (FIPS).  ...  are public values and is user's private key. is a randomly chosen integer such that . The signature of a message is the pair of numbers and computed as and .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcomm.2004.825705">doi:10.1109/lcomm.2004.825705</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ce5kjrkuzffm3ce3vnqxqhzbxq">fatcat:ce5kjrkuzffm3ce3vnqxqhzbxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706034220/http://msn.iecs.fcu.edu.tw/report/data/ori_paper/2005-9-15/01278320%5B1%5D.pdf?origin%3Dpublication_detail" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6e/a9/6ea93f9ba65849c9f7883554eef664b185826e30.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcomm.2004.825705"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications [chapter]

Jonathan Katz
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We describe efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El Gamal encryption schemes.  ...  In settings where both parties are on-line, an interactive encryption protocol may be used. We construct chosen-ciphertext-secure interactive encryption schemes based on any of the schemes above.  ...  I am grateful to Moti Yung and Rafail Ostrovsky for their many helpful comments and suggestions regarding the work described here.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-39200-9_13">doi:10.1007/3-540-39200-9_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/erwmazstcvcjjditr3ytdkvoim">fatcat:erwmazstcvcjjditr3ytdkvoim</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829063934/https://www.iacr.org/cryptodb/archive/2003/EUROCRYPT/2449/2449.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/f8/cdf817a39bb2c83820762ba96adb97f6b0fd258d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-39200-9_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Delayed password disclosure

Markus Jakobsson, Steven Myers
<span title="2007-09-01">2007</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vl3iv5wfbneltjzmeof4n5xqca" style="color: black;">ACM SIGACT News</a> </i> &nbsp;
While the protocol cannot prevent partial disclosure of one's password to the phisher, it does provide a user with the tools necessary to recognise an ongoing phishing attack, and prevent the disclosure  ...  Based on the traditional username and password paradigm, the protocol's goal is aimed at reducing the effectiveness of phishing/spoofing attacks that are becoming increasingly problematic for Internet  ...  Examples include El Gamal (1985) in the case of chosen ciphertext attacks and the Ford-Kaliski Key retrieval protocol (Ford and Kaliski, 2000) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1324215.1324228">doi:10.1145/1324215.1324228</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mmtijq5vrvckxbzwzpgphfpouu">fatcat:mmtijq5vrvckxbzwzpgphfpouu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811215426/http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf?origin=publication_detail" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/57/1e57930d4498558948e46d982eefa32be54f68d1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1324215.1324228"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 95,235 results