Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
May 25, 2023 · In this work, we set out to create a subversion resilient authenticated key exchange protocol. The first step was to design a meaningful ...
In this work, we set out to create a subversion resilient authenticated key exchange protocol. The first step was to design a meaningful security model for this ...
Dec 2, 2021 · Algorithm Substitution attack. An adversary A can substitute a legitimate algorithm with one chosen by the adversary.
Paper 2023/749 Note on Subversion-Resilient Key Exchange , Norwegian University of Science and TechnologyAbstract In this work, we set out to create a ...
Jun 8, 2020 · Note that continuous security against A key -SAs implies security in the presence of related-key attacks within the family F . It is also ...
Missing: Exchange. | Show results with:Exchange.
Subversion attacks undermine security of cryptographic protocols by replacing a legitimate honest party's implementation with one that leaks information in ...
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant security loss and can be ...
Restoring the security of maliciously implemented cryptosystems has been widely considered challenging due to the fact that the subverted implementation ...
Abstract. Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and assumes the hardware to be trusted.
Missing: Exchange. | Show results with:Exchange.
Note on Subversion-Resilient Key Exchange · A Secure Key Exchange Protocol and a Public Key Cryptosystem for Healthcare Systems · Falsifiability, Composability, ...