Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor protection of secret keys. Encrypting the keys under a human-memorizable password hardly offers any protection when the device is stolen. Trusted hardware tokens such as smart cards can provide strong protection of keys but are cumbersome to use. We consider the case where secret keys are used for digital signatures and propose a password-authenticated server-aided signature Pass2Sign pro-tocol, where signatures are collaboratively generated by a device and a server, while the user authenticates to the server with a (low-entropy) password. Neither the server nor the device store enough information to create a signature by itself or to perform an o...
We study the security requirements for remote authentication with password protected smart card. In ...
International audienceHardware security tokens have now been used for several decades to store crypt...
Part 1: Cryptography and CryptanalysisInternational audienceMalleable signatures allow the signer to...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
Abstract. We study the security requirements for remote authentication with password protected smart...
Smart card based password for authentication has become a common trend. Although smart card brings c...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
People use their personal computers, laptops, tablets and smart phones to digitally sign documents i...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
We study the security requirements for remote authentication with password protected smart card. In ...
International audienceHardware security tokens have now been used for several decades to store crypt...
Part 1: Cryptography and CryptanalysisInternational audienceMalleable signatures allow the signer to...
An important shortcoming of client-side cryptography on consumer devices is the poor protection of s...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
This paper initiates the study of two specific security threats on smart-card-based password authent...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
Abstract. We study the security requirements for remote authentication with password protected smart...
Smart card based password for authentication has become a common trend. Although smart card brings c...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
People use their personal computers, laptops, tablets and smart phones to digitally sign documents i...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
We study the security requirements for remote authentication with password protected smart card. In ...
International audienceHardware security tokens have now been used for several decades to store crypt...
Part 1: Cryptography and CryptanalysisInternational audienceMalleable signatures allow the signer to...