Sciweavers

80 search results - page 2 / 16
» Attacking and fixing PKCS
Sort
View
ACISP
2005
Springer
13 years 10 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
ASIACRYPT
2005
Springer
13 years 10 months ago
A Practical Attack on the Fixed RC4 in the WEP Mode
In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also kno...
Itsik Mantin
ISSRE
2008
IEEE
13 years 11 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
EUC
2005
Springer
13 years 10 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
ACISP
2004
Springer
13 years 10 months ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen