A computational justification for guessing attack formalisms
<p>Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a veri...
Egile Nagusiak: | Newcomb, T, Lowe, G |
---|---|
Formatua: | Report |
Argitaratua: |
Oxford University Computing Laboratory
2005
|
Antzeko izenburuak
-
A Computational Justification for Guessing Attack Formalisms
nork: Newcomb, T, et al.
Argitaratua: (2006) -
Analysing Protocol Subject to Guessing Attacks
nork: Lowe, G
Argitaratua: (2004) -
The science of guessing in collision-optimized divide-and-conquer attacks
nork: Ou, Changhai, et al.
Argitaratua: (2022) -
Improved guess-and-determine and distinguishing attacks on SNOW-V
nork: Jing Yang, et al.
Argitaratua: (2021-09-01) -
Optimal guessing in 'Guess Who'.
nork: Ben O'Neill
Argitaratua: (2021-01-01)