Cryptanalysis of PASS II and MiniPass
In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that...
| Main Authors: | Goi, , BM, Siddiqi,, MU, Ding, , JT |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2352/ |
Similar Items
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Experimental investigation of noise in double-pass erbium-doped fiber amplifiers
by: Naji, A. W., et al.
Published: (2007)
by: Naji, A. W., et al.
Published: (2007)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Numerical analysis and optimization of remotely pumped double pass Erbium doped fiber amplifier
by: Hossain, Nadir, et al.
Published: (2007)
by: Hossain, Nadir, et al.
Published: (2007)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Smart home microcontroller: Telephone interfacing
by: Leong, , CS, et al.
Published: (2006)
by: Leong, , CS, et al.
Published: (2006)
Low power and high speed 8x8 bit multiplier using non-clocked Pass Transistor Logic
by: Senthilpari, C., et al.
Published: (2007)
by: Senthilpari, C., et al.
Published: (2007)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Multiple error detection and correction based on redundant residue number systems
by: Tor Goh, Vik, et al.
Published: (2008)
by: Tor Goh, Vik, et al.
Published: (2008)
Arguments passing
by: Hakro, Dil Nawaz, et al.
Published: (2011)
by: Hakro, Dil Nawaz, et al.
Published: (2011)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
CPT 315 - PEMPROSESAN BAHASA TAB II MAC 05
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
CSP 201 - ALGORITMA DAN STRUKTUR DATA II OKT-NOV 1989
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1989)
CSP 201 - ALGORITMA DAN STRUKTUR DATA II OKT 1987-88.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1987)
CSC 201 - STRUKTUR DATA & ALGORITMA - CSP 201 - ALGORITMA DATA II OKT - NOV 94.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
CSC 201 - STRUKTUR DATA DAN ALGORITMA/ CSP 201 - ALGORTIMA & STRUKTUR DATA II OKT-NOV 1995.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1995)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Performance of JPEG image transmission using proposed asymmetric turbo code
by: Ramasamy, Kanesaraj, et al.
Published: (2007)
by: Ramasamy, Kanesaraj, et al.
Published: (2007)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Perbandingan Prestasi Antara Message Passing Interface Java (Mpijava) Dan Java Object Passing Interface (Jopi)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdah,, M, et al.
Published: (2005)
by: Al-Qdah,, M, et al.
Published: (2005)
New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems
by: ARUMUGAM, M, et al.
Published: (2005)
by: ARUMUGAM, M, et al.
Published: (2005)
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
Affective music processing: Challenges
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
by: Phon-Amnuaisuk, Somnuk
Published: (2005)
Knowledge discovery through composited visualization, navigation and retrieval
by: Lim, Wei-Ching, et al.
Published: (2005)
by: Lim, Wei-Ching, et al.
Published: (2005)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Similar Items
-
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005) -
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006) -
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)