Results 51 to 60 of about 75,500 (332)
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
RFC8573: Message authentication code for the network time protocol [PDF]
The Network Time Protocol (NTP), as described in RFC 5905, states that NTP packets should be authenticated by appending NTP data to a 128-bit key and hashing the result with MD5 to obtain a 128-bit tag.
Goldberg, Sharon, Malhotra, Aanchal
core
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers.
Fett, Daniel +2 more
core +1 more source
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core +2 more sources
Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf +6 more
wiley +1 more source
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov +2 more
doaj
Quantum-Secure Message Authentication Codes [PDF]
We construct the first Message Authentication Codes (MACs) that are existentially unforgeable against a quantum chosen message attack. These chosen message attacks model a quantum adversary’s ability to obtain the MAC on a superposition of messages of its choice.
Dan Boneh, Mark Zhandry
openaire +1 more source
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
Quantum Message Authentication Code Independent of Computational Difficulty
The rise of quantum computing poses significant challenges to security systems, with traditional message authentication codes (MACs) at unprecedented risk of compromise.
Ping Wang +3 more
doaj +1 more source

