Results 31 to 40 of about 36,777 (311)

New CBC-MAC Forgery Attacks

open access: yes, 2001
This paper is concerned with a particular type of attack against CBC-MACs, namely forgery attacks, i.e. attacks which enable an unauthorised party to obtain a MAC on a data string. Existing forgery attacks against CBC-MACs are briefly reviewed, together with the effectiveness of various countermeasures.
Brincat, Karl, Mitchell, Chris J
openaire   +10 more sources

Living body recognition method based on facial feature point motion

open access: yes网络与信息安全学报, 2018
A kind of living body recognition method was proposed,which was applied in mobile terminal and based on the deep learning.A facial movements LSTM network was trained using data sets.When users input a random sequence of video,user’s facial feature point ...
Yulong WANG,Kaiyuan LIU
doaj   +3 more sources

Shall I post this now? Optimized, delay-based privacy protection in social networks [PDF]

open access: yes, 2016
The final publication is available at Springer via http://dx.doi.org/10.1007/s10115-016-1010-4Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant ...
Forné Muñoz, Jorge   +3 more
core   +2 more sources

Security of COFB against Chosen Ciphertext Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj   +1 more source

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

Tweaking Generic OTR to Avoid Forgery Attacks [PDF]

open access: yes, 2016
This paper considers the security of the Offset Two-Round (OTR) authenticated encryption mode [9] with respect to forgery attacks. The current version of OTR gives a security proof for specific choices of the block size (n) and the primitive polynomial used to construct the finite field \(\mathbb {F}_{2^n}\).
Qahur Al Mahri, Hassan Musallam Ahmed   +4 more
openaire   +2 more sources

Cryptanalysis of the arbitrated quantum signature protocols

open access: yes, 2011
As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal.
Gao, Fei   +3 more
core   +1 more source

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model

open access: yesTongxin xuebao, 2014
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy