搜索结果: 1-10 共查到“军事学 ISO”相关记录10条 . 查询时间(0.125 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
side-channel analysis leakage detection security certification
2019/9/16
The ISO standardisation of `Testing methods for the mitigation of non-invasive attack classes against cryptographic modules' (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessmen...
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Group signature Cryptanalysis ISO/IEC 20008-2 SGX
2019/3/18
In ISO/IEC 20008-2, several anonymous digital signature schemes are specified. Among these, the scheme denoted as Mechanism 6, is the only plain group signature scheme that does not aim at providing a...
The international standard ISO/IEC 9797-1:2011 specifies six versions of MACs, called MAC Algorithm 1-6, and many of these MACs enjoy widespread use in practical applications. However, security guaran...
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
ANSI X9.24-1:2009 key check value ISO/IEC 9797-1:2011
2016/1/25
ANSI X9.24-1:2009 specifies the key check value, which is used to verify the integrity
of the blockcipher key. This value is defined as the most significant bits of the ciphertext of the zero
block,...
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Protocol analysis ISO standard PLAID
2016/1/7
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private
authentication between a smart card and a terminal. Originally developed by a unit of the Australian
Depart...
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
digital signatures forgery rsa
2009/6/12
In 1999, Coron, Naccache and Stern discovered an existential signature forgery for two popular
rsa signature standards, iso/iec 9796-1 and 2. Following this attack iso/iec 9796-1 was withdrawn. iso/i...
New attacks on ISO key establishment protocols
attacks ISO key establishment protocols key establishment mechanism
2009/6/5
Cheng and Comley demonstrated type °aw attacks against the key establishment mechanism
12 standardized in ISO/IEC 11770-2:1996. They also proposed enhancements to ¯x the security
°aws in the me...
A Proposal for an ISO Standard for Public Key Encryption
Proposal ISO Standard Public Key Encryption
2009/4/16
This document is an initial proposal for a draft for a forthcoming ISO standard on publickey
encryption. It is hoped that this proposal will serve as a basis for discussion, from which a
consensus f...
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Attacks ISO/IEC 11770-2 Key Establishment Protocol
2009/3/27
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are proposed.