-
1
-
-
33745912130
-
-
N. Asokan, V. Niemi, K. Nyberg, Man-in-the-middle in tunneled authentication protocols, in: Proceedings of the International Workshop on Security Protocols, 2003, pp. 15-24 (also available as IACR ePrint 2002/163).
-
-
-
-
2
-
-
17644398259
-
Secure object identification - or: solving the chess grandmaster problem
-
ACM Press, New York
-
Alkassar A., Stüble C., and Sadeghi A.-R. Secure object identification - or: solving the chess grandmaster problem. Proceedings of the 2003 Workshop on New Security Paradigms, Ascona, Switzerland (2003), ACM Press, New York 77-85
-
(2003)
Proceedings of the 2003 Workshop on New Security Paradigms, Ascona, Switzerland
, pp. 77-85
-
-
Alkassar, A.1
Stüble, C.2
Sadeghi, A.-R.3
-
4
-
-
0031351741
-
-
M. Bellare, et al., A concrete security treatment of symmetric encryption: analysis of the DES modes of operation, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS '97), 1997, pp. 394-403.
-
-
-
-
5
-
-
84957693225
-
Chosen Ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Kadrwer S. (Ed), Springer, Berlin
-
Bleichenbacher D. Chosen Ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Kadrwer S. (Ed). Proceedings of CRYPTO '98 (1998), Springer, Berlin 1-12
-
(1998)
Proceedings of CRYPTO '98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
7
-
-
33746075784
-
Fast and secure immunization against adaptive man-in-the-middle impersonation
-
Proceedings of EUROCRYPT '97, Springer, Berlin
-
Cramer R., and Damgård I. Fast and secure immunization against adaptive man-in-the-middle impersonation. Proceedings of EUROCRYPT '97. Lecture Notes in Computer Science vol. 1233 (1997), Springer, Berlin 75-87
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 75-87
-
-
Cramer, R.1
Damgård, I.2
-
8
-
-
33745880269
-
-
T. Dierks, C. Allen, The TLS Protocol Version 1.0, Request for Comments 2246, January 1999.
-
-
-
-
10
-
-
84990731886
-
How to prove yourself: practical solutions to identification and signature problems
-
Proceedings of CRYPTO '86, Springer, Berlin
-
Fiat A., and Shamir A. How to prove yourself: practical solutions to identification and signature problems. Proceedings of CRYPTO '86. Lecture Notes in Computer Science vol. 263 (1987), Springer, Berlin 186-194
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
Proceedings of EUROCRYPT '88, Springer, Berlin
-
Guillou L.C., and Quisquater J. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Proceedings of EUROCRYPT '88. Lecture Notes in Computer Science vol. 330 (1988), Springer, Berlin 112-123
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 112-123
-
-
Guillou, L.C.1
Quisquater, J.2
-
12
-
-
33745916320
-
-
M. Jakobsson, S. Myers, Stealth attacks and delayed password disclosure, 2005, .
-
-
-
-
13
-
-
33745913507
-
-
B. Kaliski, M. Nyström, Authentication: risk vs. readiness, challenges and solutions, in: Presentation held at the BITS Protecting the Core Forum, October 6, 2004, .
-
-
-
-
14
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 24 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
15
-
-
27844462024
-
Why have public key infrastructures failed so far?
-
Javier L., Oppliger R., and Pernul G. Why have public key infrastructures failed so far?. Internet Research 15 5 (2005) 544-556
-
(2005)
Internet Research
, vol.15
, Issue.5
, pp. 544-556
-
-
Javier, L.1
Oppliger, R.2
Pernul, G.3
-
16
-
-
33846862428
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0
-
Springer, Berlin
-
Manger J. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. Proceedings of CRYPTO '01 (2001), Springer, Berlin 230-238
-
(2001)
Proceedings of CRYPTO '01
, pp. 230-238
-
-
Manger, J.1
-
17
-
-
85084160482
-
-
J. Mitchell, V. Shmatikov, U. Stern, Finite-state analysis of SSL 3.0, in: Proceedings of the Seventh USENIX Security Symposium, USENIX, 1998, pp. 201-216.
-
-
-
-
19
-
-
33646143327
-
Effective protection against phishing and web spoofing
-
Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2005), Springer, Berlin
-
Oppliger R., and Gajek S. Effective protection against phishing and web spoofing. Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2005). Lecture Notes in Computer Science vol. 3677 (2005), Springer, Berlin 32-41
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 32-41
-
-
Oppliger, R.1
Gajek, S.2
-
20
-
-
33745885542
-
-
R. Oppliger, R. Hauser, D. Basin, SSL/TLS Session-Aware User Authentication Revisited, Computer Communications, in preparation.
-
-
-
-
23
-
-
17444421583
-
Does trusted computing remedy computer security problems?
-
Oppliger R., and Rytz R. Does trusted computing remedy computer security problems?. IEEE Security and Privacy 3 2 (2005) 16-19
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 16-19
-
-
Oppliger, R.1
Rytz, R.2
-
26
-
-
33745918212
-
-
RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, June 28, 2004.
-
-
-
-
28
-
-
33745886115
-
-
R. Shirey, Internet Security Glossary, Request for Comments 2828, May 2000.
-
-
-
-
29
-
-
84947212539
-
Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS ...
-
Proceedings of EUROCRYPT '02, Springer, Amsterdam, Netherland
-
Vaudenay S. Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS .... Proceedings of EUROCRYPT '02. Lecture Notes in Computer Science vol. 2332 (2002), Springer, Amsterdam, Netherland 534-545
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 534-545
-
-
Vaudenay, S.1
-
30
-
-
85084161317
-
-
Z.E. Ye, S. Smith, Trusted paths for browsers, in: Proceedings of the USENIX Security Symposium, 2002, pp. 263-279.
-
-
-
-
31
-
-
84946432389
-
-
D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol. USENIX Security Symposium, 1996, pp. 29-40.
-
-
-
|