نتایج جستجو برای: secret disclosure attack

تعداد نتایج: 121525  

Journal: :IACR Cryptology ePrint Archive 2017
Hassan Qahur Al Mahri Leonie Ruth Simpson Harry Bartlett Ed Dawson Kenneth Koon-Ho Wong

The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L) that are distinct for each message. The existence of secret masks in XEX mode prevents the application of conventional fault attack techniques, such as differential fault analysis. This work investigates other types of fault attacks against XEX mode that either eliminate the...

2012
Jonathan L. Dautrich Chinya V. Ravishankar

Three recently proposed schemes use secret sharing to support privacy-preserving data outsourcing. Each secret in the database is split into n shares, which are distributed to independent data servers. A trusted client can use any k shares to reconstruct the secret. These schemes claim to offer security even when k or more servers collude, as long as certain information such as the finite field...

Journal: :IACR Cryptology ePrint Archive 2016
Iris Anshel Derek Atkins Dorian Goldfeld Paul E. Gunnells

The Algebraic Eraser Diffie–Hellman (AEDH) protocol was introduced in 2005 and published in 2006 by I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux as a protocol suitable for use on platforms with constrained computational resources, such as FPGAs, ASICs, and wireless sensors. It is a group-theoretic cryptographic protocol that allows two users to construct a shared secret via a Diffie–Hellma...

2015
Tyge Tiessen Lars R. Knudsen Stefan Kölbl Martin M. Lauridsen

How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allow to recover both the secret key and the secret S-box for respectively four, five, and six rounds of the AES. Despite the signi...

Journal: :Int. J. Communication Systems 2018
Younes Hatri Ayoub Otmani Kenza Guenda

Authenticated Key Exchange (AKE) protocols represent an important cryptographic mechanism that enables several parties to communicate securely over an open network. Elashry, Mu and Susilo proposed in 2015 an Identity Based Authenticated Key Exchange (IBAKE) protocol where different parties establish secure communication by means of their public identities. The authors also introduced a new secu...

Journal: :IACR Cryptology ePrint Archive 2008
Zbigniew Golebiewski Krzysztof Majcher Filip Zagórski Marcin Zawada

HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...

2013
Yu-Chi Chen Gwoboa Horng Du-Shiau Tsai

Visual Secret Sharing (VSS), first introduced by Naor and Shamir, is a variant form of secret sharing; especially, secret decoding is stacking shares together without performing any complicated cryptographic computation. The recovered secret is visible by human vision system (HVS). However, Horng et al. showed cheating is possible in VSS, which is inspired from cheating in secret sharing. Since...

Journal: :IJAHUC 2013
Jing Deng Yunghsiang Sam Han

In the technical literature, many random key pre-distribution techniques have been proposed to secure wireless sensor networks (WSNs). Such techniques only establish keys for some pairs of physically connected sensors. On the contrary, in many WSN applications, a source node must securely communicate with all of its neighbours. In this work, we address the issue of delivering secret link keys t...

Journal: :Int. Arab J. Inf. Technol. 2015
Ravva Santosh Challa Narasimham Pallam Shetty

LSBS-RSA is a variation of RSA cryptosystem with modulus primes p, q, sharing a large number of least significant bits. As original RSA, LSBS-RSA is also vulnerable to the short secret exponent attack. Sun et al. [15] studied this problem and they provided the bound for secret exponent as: 2 2 5 4 3 1 6 1 3 6 3 2 2 6 γ β α α γ α − < + − + − −       . Their bound does not reduce to the opt...

2016
Sphiwe Madiba Mathildah Mokgatle

Background. There is limited research on the disclosure experiences of adolescents with perinatal acquired HIV (PAH). The study explores how adolescents with PAH experience living with HIV and examined their perceptions and experiences regarding disclosure and onward self-disclosure to friends and sexual partners. Methods. Thematic analysis was used to analyze in-depth interviews conducted with...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید