搜索结果: 1-9 共查到“军事学 Signal”相关记录9条 . 查询时间(0.093 秒)
In 2017, a practical attack, referred to as the signal leakage attack, against reconciliation-based RLWE key exchange protocols was proposed. In particular, this attack can recover a long-term private...
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
AMS security logic locking process variations
2018/11/12
Similar to digital circuits, analog and mixed-signal (AMS) circuits are also susceptible to supply-chain attacks such as piracy, overproduction, and Trojan insertion. However, unlike digital circuits,...
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Signal protocol double ratcheting secure messaging
2018/11/2
Signal is a famous secure messaging protocol used by billions of people, by virtue of many secure text messaging applications including Signal itself, WhatsApp, Facebook Messenger, Skype, and Google A...
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
RLWE key exchange post quantum
2017/12/13
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key ...
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema
End-to-End Encryption Group Communication Broadcast
2017/7/28
Secure Instant Messaging (SIM) is utilized in two variants: one-to-one communication and group communication. While the first variant has received much attention lately (Frosch et al., EuroS&P16; Cohn...
Leakage of Signal function with reused keys in RLWE key exchange
RLWE key exchange post quantum
2017/1/3
In this paper, we show that the signal function used in RLWE key exchange could leak information to find the secret ss of a reused public key p=as+2ep=as+2e. This work is motivated by an attack propos...
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring a...
A Formal Security Analysis of the Signal Messaging Protocol
protocols messaging post-compromise security
2016/12/8
Signal is a new security protocol and accompanying app that provides end-to-end encryption for
instant messaging. The core protocol has recently been adopted by WhatsApp, Facebook Messenger, and
Goo...
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Signal security information security communication reliability
2016/1/26
Signal security aims to prevent the adversary from copying communication
signals—so it is with quantum cryptography. Information security focuses on
preventing the adversary from knowing plaintext o...