At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions.\ud \ud In this paper, we attempt to fill this gap by generali...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Recent history has revealed that many random number generators (RNGs) used in cryptographic algorith...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed i...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a...
Authentication theory deals with problems connected with the protection of information sent over ins...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Recent history has revealed that many random number generators (RNGs) used in cryptographic algorith...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed i...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in...
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user i...
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a...
Authentication theory deals with problems connected with the protection of information sent over ins...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Recent history has revealed that many random number generators (RNGs) used in cryptographic algorith...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed i...