Abstract. The classical way of authentication with a username-password pair is often insufficient: an adversary can choose from a multitude of methods to obtain the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous so-lutions incorporating a second factor in the authentication process have been proposed. A particularly wide-spread approach provides each user with a hardware token that generates a One-Time Password (OTP) in addition to the traditional credentials. The token itself comprises a secret cryptographic key that, together with timestamps and counters, is used to derive a fresh OTP for each au...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Interne...
Various electronic devices are increasingly being connected to the Internet. Meanwhile, security pro...
International audienceThe Yubikey is a small hardware device designed to authenticate a user against...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
[[abstract]]Designing authenticated key exchange protocols for portable devices to secure communicat...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Authentication is a critical issue in wireless communication due to the impersonation and substituti...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The use of a second factor to increase the security of systems is growing and has continued to do so...
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that...
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, ...
Abstract. Authentication based on cryptographic protocols is a key technology for recent security sy...
Computing systems have been under increasingly sophisticated attack over the Internet and by using d...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Interne...
Various electronic devices are increasingly being connected to the Internet. Meanwhile, security pro...
International audienceThe Yubikey is a small hardware device designed to authenticate a user against...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
[[abstract]]Designing authenticated key exchange protocols for portable devices to secure communicat...
peer reviewedSide-channel attacks are powerful tools for breaking systems that implement cryptograph...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Authentication is a critical issue in wireless communication due to the impersonation and substituti...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The use of a second factor to increase the security of systems is growing and has continued to do so...
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that...
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, ...
Abstract. Authentication based on cryptographic protocols is a key technology for recent security sy...
Computing systems have been under increasingly sophisticated attack over the Internet and by using d...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Interne...
Various electronic devices are increasingly being connected to the Internet. Meanwhile, security pro...