Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo |
Using rhythmic nonces for puzzle-based DoS resistance. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
security |
69 | Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito |
Verification of Authentication Protocols Based on the Binding Relation. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
62 | Peter James Leadbitter, Nigel P. Smart |
Analysis of the Insecurity of ECMQV with Partially Known Nonces. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Ramaswamy Ramanujam, S. P. Suresh |
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well. |
FSTTCS |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs |
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
55 | Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi |
Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. |
AsiaCCS |
2015 |
DBLP DOI BibTeX RDF |
|
52 | Erik Zenner |
Nonce Generators and the Nonce Reset Problem. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce |
50 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
50 | Stephen Keung, Kai-Yeung Siu |
Efficient protocols secure against guessing and replay attacks. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks |
45 | Phong Q. Nguyen, Igor E. Shparlinski |
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem |
45 | Phong Q. Nguyen, Igor E. Shparlinski |
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. |
J. Cryptol. |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Edwin El Mahassni, Phong Q. Nguyen, Igor E. Shparlinski |
The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
Exponential Sums, DSA, Hidden Number Problem, Closest Vector Problem |
35 | Mark Bickford |
Unguessable Atoms: A Logical Foundation for Security. |
VSTTE |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Hongjun Wu 0001, Bart Preneel |
Differential-Linear Attacks Against the Stream Cipher Phelix. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
35 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Analysis of Typed Analyses of Authentication Protocols. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jean Liénardy, Frédéric Lafitte |
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. |
Inf. Process. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Jean Liénardy, Frédéric Lafitte |
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
28 | Dylan Rowe, Joachim Breitner, Nadia Heninger |
The curious case of the half-half Bitcoin ECDSA nonces. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
28 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. |
ESORICS Workshops (2) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Dylan Rowe, Joachim Breitner, Nadia Heninger |
The Curious Case of the Half-Half Bitcoin ECDSA Nonces. |
AFRICACRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad |
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Florian Euchner, Christian Senger |
PERIDOT Codes: Replacing Identifiers, Sequence Numbers and Nonces with Permutations. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis |
Attacking (EC)DSA With Partially Known Multiples of Nonces. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
28 | Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs |
Minerva: The curse of ECDSA nonces. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
28 | Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille |
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
28 | Vivek Arte, Mihir Bellare, Louiza Khati |
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
28 | Amber Sprenkels, Bas Westerbaan |
Don't throw your nonces out with the bathwater. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
28 | Sergey Agievich |
The CTR mode with encrypted nonces and its extension to AE. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
28 | Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille |
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. |
CCS |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Vivek Arte, Mihir Bellare, Louiza Khati |
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. |
INDOCRYPT |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Ruth Ng, Björn Tackmann |
Nonces are Noticed: AEAD Revisited. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
28 | Martin J. Tunnicliffe, Omego Obinna, Eckhard Pflügel |
Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces. |
ICGS3 |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Ruth Ng, Björn Tackmann |
Nonces Are Noticed: AEAD Revisited. |
CRYPTO (1) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud |
Reusing Nonces in Schnorr Signatures. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
28 | Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud |
Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...). |
ESORICS (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Rémy Chrétien, Véronique Cortier, Stéphanie Delaune |
Decidability of Trace Equivalence for Protocols with Nonces. |
CSF |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Rémy Chrétien, Véronique Cortier, Stéphanie Delaune |
Checking Trace Equivalence: How to Get Rid of Nonces? |
ESORICS (2) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Yuval Yarom, Naomi Benger |
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
28 | Mingjie Liu, Jiazhe Chen, Hexin Li |
Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. |
Inscrypt |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Neil Spring, David Wetherall, David Ely |
Robust Explicit Congestion Notification (ECN) Signaling with Nonces. |
RFC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Peter James Leadbitter, Nigel P. Smart |
Cryptanalysis of MQV with partially known nonces. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
28 | Mihir Bellare, Phillip Rogaway |
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
28 | B. Clifford Neuman, Stuart G. Stubblebine |
A Note on the Use of Timestamps as Nonces. |
ACM SIGOPS Oper. Syst. Rev. |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Zhiyao Liang, Rakesh M. Verma |
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
insecurity, Cryptographic protocols, secrecy, NP |
17 | Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, Patrick Schaumont |
Physical unclonable function and true random number generator: a compact and scalable implementation. |
ACM Great Lakes Symposium on VLSI |
2009 |
DBLP DOI BibTeX RDF |
ring oscillators (ro), trng, fpga, scalable, jitter, macro, puf |
17 | Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer |
On the Security of the CCM Encryption Mode and of a Slight Variant. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
CCM, CBC-MAC, Counter mode |
17 | Yuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh |
Key Management for Wireless Sensor Networks Using Trusted Neighbors. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke |
Selecting theories and nonce generation for recursive protocols. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
security protocols, decidability, automatic analysis |
17 | Sibylle B. Fröschle |
The Insecurity Problem: Tackling Unbounded Data. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh |
Knowledge-based modelling of voting protocols. |
TARK |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Amit Mondal, Aleksandar Kuzmanovic |
A Poisoning-Resilient TCP Stack. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury |
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos |
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu |
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. |
PPDP |
2005 |
DBLP DOI BibTeX RDF |
resolution strategies, verification, cryptographic protocols, horn clauses |
17 | Hubert Comon-Lundh |
Intruder Theories (Ongoing Work). |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Frédéric Muller |
Differential Attacks against the Helix Stream Cipher. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic |
A Derivation System for Security Protocols and its Logical Formalization. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard |
The Insecurity of Esign in Practical Implementations. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Heba Kamal Aslan |
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Koji Hasebe, Mitsuhiro Okada |
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Joshua D. Guttman |
Security Protocol Design via Authentication Tests. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Marco Bozzano, Giorgio Delzanno |
Automated protocol verification in linear logic. |
PPDP |
2002 |
DBLP DOI BibTeX RDF |
model checking, linear logic, authentication protocols, bottom-up evaluation |
17 | Andrew D. Gordon 0001, Alan Jeffrey |
Authenticity by Typing for Security Protocols. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Andrew D. Gordon 0001, Alan Jeffrey |
A Type and Effect Analysis of Security Protocols. |
SAS |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
17 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Cryptanalytic Attacks on Pseudorandom Number Generators. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 |
Beacon Based Authentication. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol |
17 | Darrell D. E. Long |
A Note on Bit-Mapped Free Sector Management. |
ACM SIGOPS Oper. Syst. Rev. |
1993 |
DBLP DOI BibTeX RDF |
|