Sciweavers

362 search results - page 27 / 73
» Extending the Resynchronization Attack
Sort
View
IFIP
2009
Springer
15 years 1 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
ICSE
2004
IEEE-ACM
16 years 3 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ACISP
2008
Springer
15 years 10 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 8 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
USS
2004
15 years 5 months ago
Graphical Dictionaries and the Memorable Space of Graphical Passwords
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force ...
Julie Thorpe, Paul C. van Oorschot