How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
Cryptanalysis and protocol failures
Communications of the ACM
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
ACM SIGACT News
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
UEPS - A Second Generation Electronic Wallet
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Liability and Computer Security: Nine Principles
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Attack on the Cryptographic Scheme NIKS-TAS
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the Third International Workshop on Fast Software Encryption
Computer
The eurocrypt'92 controversial issue trapdoor primes and moduli
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
How to break a "Secure" oblivious transfer protocol
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
How to break another "provably secure" payment system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Collision free hash functions and public key signature schemes
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
Proceedings of the 4th ACM conference on Computer and communications security
A new public key cryptosystem based on higher residues
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
AMBAR Protocol: Access Management Based on Authorization Reduction
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
The Risks of Compromising Secret Information
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Characterization of Elliptic Curve Traces under FR-Reduction
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Evaluating Differential Fault Analysis of Unknown Cryptosystems
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Probing Attacks on Tamper-Resistant Devices
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
Proceedings of the 2003 workshop on New security paradigms
Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Scalable security and accounting services for content-based publish/subscribe systems
Proceedings of the 2005 ACM symposium on Applied computing
Encyclopedia of Computer Science
Securing the drop-box architecture for assisted living
Proceedings of the fourth ACM workshop on Formal methods in security
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Token-mediated certification and electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A java beans component architecture for cryptographic protocols
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computer Research
WSEAS Transactions on Information Science and Applications
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computers
Design of a secure chat application based on AES cryptographic algorithm and key management
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
Password authenticated key exchange by juggling
Security'08 Proceedings of the 16th International conference on Security protocols
Federated identity-management protocols
Proceedings of the 11th international conference on Security Protocols
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Controlling spam by secure internet content selection
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On tolerant cryptographic constructions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A cross-protocol attack on the TLS protocol
Proceedings of the 2012 ACM conference on Computer and communications security
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help attackers spot errors which can be exploited.