Results 271 to 280 of about 36,777 (311)
Some of the next articles are maybe not open access.
Evolution of cross site request forgery attacks
Journal in Computer Virology, 2007This paper presents a state of the art of cross-site request forgery (CSRF) attacks and new techniques which can be used by potential intruders to make them more effective. Several attack scenarios on widely used web applications are discussed, and a vulnerability which affect most recent browsers is explained.
Renaud Feil, Louis Nyffenegger
openaire +1 more source
Forgery Attacks on FlexAE and FlexAEAD
2019Open image in new window is one of the round-1 candidates in the ongoing NIST Lightweight Cryptography standardization project and an evolution of the previously published Open image in new window scheme. For each data block, the mode performs multiple calls to a permutation in an Even-Mansour construction.
Maria Eichlseder +2 more
openaire +1 more source
Cross-Site Request Forgery: Attack and Defense
2010 7th IEEE Consumer Communications and Networking Conference, 2010Cross Site Request Forgery (CSRF) has emerged as a potent threat to Web 2.0 applications. Because of the stateless nature of the HTTP protocol, a malicious website can force the user's browser to send unauthorized requests to a trusted site. This demo provides hands on exposure of the various ways in which some popular web applications are exploited ...
Tatiana Alexenko +3 more
openaire +1 more source
Forgery Attacks on Round-Reduced ICEPOLE-128
2016ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition presented at CHES 2014. To justify the use of ICEPOLE, or to point out potential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance of ICEPOLE-128 against forgery attacks.
Christoph Dobraunig +2 more
openaire +1 more source
Forgery attack to Kang-Tang digital signature scheme
AIP Conference Proceedings, 2014In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.
Jie Fang, Yongning Guo, Chenglian Liu
openaire +1 more source
A Single Query Forgery Attack on Raviyoyla v1
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015Raviyoyla v1 is an authenticated encryption algorithm submitted to the first round of the CAESAR competition which is a grand occasion launched recently to identify efficient, flexible and secure authenticated encryption primitives. Raviyoyla v1 is composed by an additive stream cipher motivated by the eSTREAM candidate MAG v2 and a keyed hash function.
Yuan Yao, Bin Zhang, Wenling Wu
openaire +1 more source
Forgery attack on optical encryption based on computational ghost imaging
Optics Letters, 2020Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error ...
Sheng Yuan +3 more
openaire +2 more sources
Synthetic Forgery Attack against Continuous Keystroke Authentication Systems
2018 27th International Conference on Computer Communication and Networks (ICCCN), 2018Keystroke dynamics is an effective behavioral biometric for user authentication at a computer terminal. While many promising approaches have been proposed to enhance the recognition performance and several applications have been deployed to improve the system security level, the robustness under forgery attacks has not been well studied. In this paper,
Yan Sun, Shambhu Upadhyaya
openaire +1 more source
A MAC Forgery Attack on SOBER-128
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005SOBER-128 is a stream cipher designed by Rose and Hawkes in 2003. It can be also used for generating Message Authentication Codes (MACs) and an authenticated encryption. The developers claimed that it is diffcult to forge MACs generated by both functions of SOBER-128, though, the security assumption in the proposal paper is not realistic in some ...
openaire +1 more source
A new forgery attack on message recovery signatures
Journal of Electronics (China), 2000After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented.
Zichen Li +3 more
openaire +1 more source

