-
1
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
INSTICC Press
-
G. V. Bard, "A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL," IEEE In-ternational Conference on Security and Cryptogra-phy, INSTICC Press, 2006.
-
(2006)
IEEE In-ternational Conference on Security and Cryptogra-phy
-
-
Bard, G.V.1
-
2
-
-
0003402107
-
-
Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan.
-
M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, Mini-mal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security, Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan. 1996. (http://www.crypto.com/papers/)
-
(1996)
Mini-mal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
-
-
Blaze, M.1
Diffie, W.2
Rivest, R.L.3
Schneier, B.4
Shimomura, T.5
Thompson, E.6
Wiener, M.7
-
3
-
-
84958778419
-
On a limitation of BAN logic
-
LNCS 765, sSpringer-Verlag
-
C. Boyd and W. Mao, "On a limitation of BAN logic," Eurocrypt'93, LNCS 765, pp. 240-247, Springer-Verlag, 1993.
-
(1993)
Eurocrypt'93
, pp. 240-247
-
-
Boyd, C.1
Mao, W.2
-
4
-
-
0025386404
-
A logic of au-thentication
-
M. Burrows, M. Abadi, R. Needham, "A logic of au-thentication," ACM Transactions on Computer Sys-tems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Sys-tems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0017018484
-
New directions in cryptography
-
W. Diffe and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Infomation Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Infomation Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffe, W.1
Hellman, M.E.2
-
6
-
-
33750295660
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich, Foundations of Cryptography: Vol. 1, Basic Tools, Cambridge University Press, 2007.
-
(2007)
Basic Tools
, vol.1
-
-
Goldreich, O.1
-
7
-
-
0003370741
-
A security risk of depending on synchro-nized clocked
-
L. Gong, "A security risk of depending on synchro- nized clocked," ACM SIGOPS Operating Systems Review, vol. 26, no. 1, pp. 49-53, 1992.
-
(1992)
ACM SIGOPS Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
12
-
-
84871182822
-
-
PC World, IDG News Service
-
J. Kirk, "Researcher: RSA 1024-bit encryption not enough", PC World, IDG News Service, 2007. (http://www.pcworld.com/article/132184/researcherrsa1024bitencryptionnotenough.html)
-
(2007)
Researcher: RSA 1024-bit encryption not enough
-
-
Kirk, J.1
-
13
-
-
35248848850
-
Attacking RSA-based sessions in SSL/TLS
-
LNCS, Springer Berlin
-
V. Klma, O. Pokorn, T. Rosa, "Attacking RSA-based sessions in SSL/TLS," Proceeding of Cryptographic Hardware and Embedded Systems, LNCS 2779, pp. 426-440, Springer Berlin, 2003.
-
(2003)
Proceeding of Cryptographic Hardware and Embedded Systems
, vol.2779
, pp. 426-440
-
-
Klma, V.1
Pokorn, O.2
Rosa, T.3
-
14
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
LNCS, Springler Verlag
-
P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems," Pro- ceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1109, pp. 104-113, Springler Verlag, 1996.
-
(1996)
Pro-ceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
15
-
-
23944465414
-
A limited-used key generation scheme for Internet transac-tions
-
LNCS, Springer Berlin
-
S. Kungpisdan, P. D. Le, B. Srinivasan, "A limited- used key generation scheme for Internet transac-tions," Proceeding of Workshop on Information Secu- rity Applications, LNCS 3325, pp. 302-316, Springer Berlin, 2005.
-
(2005)
Proceeding of Workshop on Information Secu-rity Applications
, vol.3325
, pp. 302-316
-
-
Kungpisdan, S.1
Le, P.D.2
Srinivasan, B.3
-
16
-
-
74549221711
-
-
Designs, Codes and Cryptography
-
L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, "An efficient protocol for authenticated key agree-ment," Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
-
(2003)
An efficient protocol for authenticated key agree-ment
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
17
-
-
67449086205
-
Wavelet based detection of session hijacking attacks in wireless networks
-
IEEE GLOBECOM
-
X. Long and B. Sikdar, "Wavelet based detection of session hijacking attacks in wireless networks," Pro-ceeding of IEEE Global Telecommunications Confer- ence, IEEE GLOBECOM, pp. 1-5, 2008.
-
(2008)
Pro-ceeding of IEEE Global Telecommunications Confer-ence
, pp. 1-5
-
-
Long, X.1
Sikdar, B.2
-
19
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
San Antonio, Texas
-
J. C. Mitchell, V. Shmatikov, and U. Stern, "Finite-state analysis of SSL 3.0," Proceeding of the 7th Con- ference on USENIX Security Symposium, pp. 201-206, San Antonio, Texas, 1998.
-
(1998)
Proceeding of the 7th Con-ference on USENIX Security Symposium
, pp. 201-206
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
20
-
-
80855153332
-
Re-visiting the one-time pad
-
N. Nagaraj, V. Vaidya, and P. G. Vaidya, "Re-visiting the one-time pad," International Journal of Network Security, vol. 6, no. 1, pp. 94-102, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 94-102
-
-
Nagaraj, N.1
Vaidya, V.2
Vaidya, P.G.3
-
21
-
-
84875289084
-
A method for Authentication services in wireless net-works
-
Toronto, Canada
-
H. H. Ngo, X. Wu, P. D. Le and C. Wilson, "A method for Authentication services in wireless net-works," The Proceeding of 14th Americas Conference on Information Systems, pp. 1-9, Toronto, Canada, 2008.
-
(2008)
The Proceeding of 14th Americas Conference on Information Systems
, pp. 1-9
-
-
Ngo, H.H.1
Wu, X.2
Le, P.D.3
Wilson, C.4
-
22
-
-
85024252307
-
Inductive analysis of the Internet protocol TLS
-
L. C. Paulson, "Inductive analysis of the Internet protocol TLS," ACM Transactions on Information and System Security, vol. 2, no. 3, pp. 332-351, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryp-tosystems
-
R. L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public-key cryp-tosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
24
-
-
33751089103
-
On compromis-ing password-based authentication over HTTPS
-
T. Saito, R. Hatsugai, T. Kito, "On compromis- ing password-based authentication over HTTPS," Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06), pp. 869-874, 2006.
-
(2006)
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06)
, pp. 869-874
-
-
Saito, T.1
Hatsugai, R.2
Kito, T.3
-
28
-
-
84962060059
-
The logic of authen-tication protocols
-
LNCS, Springer-Verlag
-
P. Syverson and I. Cervesato, "The logic of authen-tication protocols," Processing of Foundations of Se-curity Analysis and Design, LNCS 2171, pp. 63-136, Springer-Verlag, 2001.
-
(2001)
Processing of Foundations of Se-curity Analysis and Design
, vol.2171
, pp. 63-136
-
-
Syverson, P.1
Cervesato, I.2
-
31
-
-
84985796228
-
HAVAL-a one-way hashing algorithm with variable length of output
-
AUSCRYPT, LNCS, Springer-Verlag
-
Y. Zheng, J. Pieprzyk, J. Seberry, "HAVAL-a one-way hashing algorithm with variable length of output," Proceeding of International Conference on Cryptology: Advances in Cryptology, AUSCRYPT, LNCS 718, pp. 81-104, Springer-Verlag, 1993.
-
(1993)
Proceeding of International Conference on Cryptology: Advances in Cryptology
, vol.718
, pp. 81-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|