ADJ 发表于 2025-3-26 23:37:32

Analysis of the PKCS#11 API Using the Maude-NPA Toolices such as smartcards and Hardware Security Modules (HSMs). However, several Crypto APIs have been shown to be subject to attacks in which sensitive information is disclosed to an attacker, such as the RSA Laboratories Public Key Standards PKCS#11, an API widely adopted in industry. Recently, ther

大量 发表于 2025-3-27 02:24:10

How to Manipulate Curve Standards: A White Paper for the Black Hat ,by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable..This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabotaging the standard. This initial cost depends heavil

吸引人的花招 发表于 2025-3-27 09:17:17

Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider . key substitution attacks where the base element is considered as a part of the public key and can be substituted. We firs

在前面 发表于 2025-3-27 10:52:05

http://reply.papertrans.cn/87/8635/863439/863439_34.png

burnish 发表于 2025-3-27 14:09:42

Improving Air Interface User Privacy in Mobile Telephony with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant alterations to the existing deployed infrastructures, which are almost certainly impractical to achieve in p

得罪 发表于 2025-3-27 19:35:23

Generating Unlinkable IPv6 Addresses, existing schemes for address autoconfiguration do not adequately consider the full context in which they might be implemented, in particular the impact of low quality random number generation. This can have a fundamental impact on the privacy property of unlinkability, one of the design goals of a

d-limonene 发表于 2025-3-27 23:37:36

A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios andreferred to as entity authentication assurance, and its degree is often called LoA (levels of assurance, or assurance levels). There are two prominent LoA standards: NIST SP800-63-2 and ISO/IEC 29115:2013. LoAs are designed to express different levels of assurance. Multiple viewpoints are set in as

灯泡 发表于 2025-3-28 02:42:44

http://reply.papertrans.cn/87/8635/863439/863439_38.png

sterilization 发表于 2025-3-28 09:26:47

Formal Support for Standardizing Protocols with Statetood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions..We adapt one of these tools, ., to provide automated

TRUST 发表于 2025-3-28 11:42:43

http://reply.papertrans.cn/87/8635/863439/863439_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Security Standardisation Research; Second International Liqun Chen,Shin‘ichiro Matsuo Conference proceedings 2015 Springer International Pu