A computational justification for guessing attack formalisms
<p>Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a veri...
Prif Awduron: | Newcomb, T, Lowe, G |
---|---|
Fformat: | Report |
Cyhoeddwyd: |
Oxford University Computing Laboratory
2005
|
Eitemau Tebyg
-
A Computational Justification for Guessing Attack Formalisms
gan: Newcomb, T, et al.
Cyhoeddwyd: (2006) -
Analysing Protocol Subject to Guessing Attacks
gan: Lowe, G
Cyhoeddwyd: (2004) -
The science of guessing in collision-optimized divide-and-conquer attacks
gan: Ou, Changhai, et al.
Cyhoeddwyd: (2022) -
Improved guess-and-determine and distinguishing attacks on SNOW-V
gan: Jing Yang, et al.
Cyhoeddwyd: (2021-09-01) -
Optimal guessing in 'Guess Who'.
gan: Ben O'Neill
Cyhoeddwyd: (2021-01-01)