ADJ
发表于 2025-3-26 23:37:32
Analysis of the PKCS#11 API Using the Maude-NPA Toolices such as smartcards and Hardware Security Modules (HSMs). However, several Crypto APIs have been shown to be subject to attacks in which sensitive information is disclosed to an attacker, such as the RSA Laboratories Public Key Standards PKCS#11, an API widely adopted in industry. Recently, ther
大量
发表于 2025-3-27 02:24:10
How to Manipulate Curve Standards: A White Paper for the Black Hat ,by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable..This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabotaging the standard. This initial cost depends heavil
吸引人的花招
发表于 2025-3-27 09:17:17
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider . key substitution attacks where the base element is considered as a part of the public key and can be substituted. We firs
在前面
发表于 2025-3-27 10:52:05
http://reply.papertrans.cn/87/8635/863439/863439_34.png
burnish
发表于 2025-3-27 14:09:42
Improving Air Interface User Privacy in Mobile Telephony with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant alterations to the existing deployed infrastructures, which are almost certainly impractical to achieve in p
得罪
发表于 2025-3-27 19:35:23
Generating Unlinkable IPv6 Addresses, existing schemes for address autoconfiguration do not adequately consider the full context in which they might be implemented, in particular the impact of low quality random number generation. This can have a fundamental impact on the privacy property of unlinkability, one of the design goals of a
d-limonene
发表于 2025-3-27 23:37:36
A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios andreferred to as entity authentication assurance, and its degree is often called LoA (levels of assurance, or assurance levels). There are two prominent LoA standards: NIST SP800-63-2 and ISO/IEC 29115:2013. LoAs are designed to express different levels of assurance. Multiple viewpoints are set in as
灯泡
发表于 2025-3-28 02:42:44
http://reply.papertrans.cn/87/8635/863439/863439_38.png
sterilization
发表于 2025-3-28 09:26:47
Formal Support for Standardizing Protocols with Statetood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions..We adapt one of these tools, ., to provide automated
TRUST
发表于 2025-3-28 11:42:43
http://reply.papertrans.cn/87/8635/863439/863439_40.png