![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). ...
-
Chapter and Conference Paper
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks
This paper considers the global communication environment of B3G wireless networks when integrating security mechanism of two wireless networks, WLAN and 3G cellular networks. As a result, the existing integra...
-
Chapter and Conference Paper
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
The technique of RSA private computation speedup by using Chinese Remainder Theorem (CRT) is well known and has already been widely employed in almost all RSA implementations. A recent CRT-based factorization ...
-
Chapter and Conference Paper
Relative Doubling Attack Against Montgomery Ladder
Highly regular execution and the cleverly included redundant computation make the square-multiply-always exponentiation algorithm well known as a good countermeasure against the conventional simple power analy...
-
Chapter and Conference Paper
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
This paper addresses the problem of making signatures of one domain (an ad-hoc network) available in another domain (the Internet). Universal verifiability is a highly desirable property when signed documents ...
-
Chapter and Conference Paper
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...
-
Article
Security extension for the Canetti-Krawczyk model in identity-based systems
The Canetti-Krawczyk (CK) model is a formalism for the analysis of key-exchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lac...
-
Chapter and Conference Paper
On the Security of the Canetti-Krawczyk Model
The Canetti-Krawczyk (CK) model is a formal method to design and analyze of key agreement protocols, and these protocols should have some desirable security attributes. In this paper, the relationship between ...
-
Chapter and Conference Paper
A Robust Double Auction Protocol Based on a Hybrid Trust Model
Recently, Wang and Leung proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation and are not...
-
Chapter and Conference Paper
Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption
In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A ...
-
Chapter and Conference Paper
Side Channel Cryptanalysis on SEED
The Korea standard block cipher, SEED, is a 128-bit symmetric block cipher with a more complex F function than DES. This paper shows that SEED is vulnerable to two types of side channel attacks, a fault analys...
-
Chapter and Conference Paper
Differential Power Analysis on Block Cipher ARIA
ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper s...
-
Chapter and Conference Paper
Efficient Group Key Management for Dynamic Peer Networks
In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...
-
Chapter and Conference Paper
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis
This paper considers a secure and practical CRT-based RSA signature implementation against both side channel attacks (including power analysis attack, timing attack, and most specially the recent MRED attack) ...
-
Chapter and Conference Paper
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i
The IEEE 802.11i is the security standard to solve the security problems of WLAN, in which, the protocol 4-way handshake plays a very important role in the authentication and key agreement process. In this pap...
-
Chapter and Conference Paper
An Improved Double Auction Protocol Against False Bids
M. Yokoo et al. analyzed some weaknesses in McAfee’s double auction (MCD) protocol and proposed a robust threshold price double auction (TPD) protocol against false-name bids. Unfortunately, as their protocol str...
-
Chapter and Conference Paper
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
In identity-based cryptography, a user’s public key is easily derived from the user’s identity and a corresponding private key is generated for the user by a trusted third party, known as a Key Generation Cent...
-
Chapter and Conference Paper
Dragon: A Fast Word Based Stream Cipher
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and init...
-
Chapter and Conference Paper
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. However, this category of counter...
-
Chapter and Conference Paper
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the...