Return Of {Bleichenbacher's} Oracle Threat ({{{{{ROBOT}}}}})

H Böck, J Somorovsky, C Young - 27th USENIX Security Symposium …, 2018 - usenix.org
In 1998 Bleichenbacher presented an adaptive chosen-ciphertext attack on the RSA
PKCS~# 1~ v1. 5 padding scheme. The attack exploits the availability of a server which …

On threats to the 5G service based architecture

GM Køien - Wireless Personal Communications, 2021 - Springer
Abstract The 3GPP-based 5G System marks a clear departure form the previous
generations. There is a new radio system and a complete overhaul of the core network …

Practical decryption exfiltration: Breaking pdf encryption

J Müller, F Ising, V Mladenov, C Mainka… - Proceedings of the …, 2019 - dl.acm.org
The Portable Document Format, better known as PDF, is one of the most widely used
document formats worldwide, and in order to ensure information confidentiality, this file …

Bringing JSON signatures to ETSI AdES framework: Meet JAdES signatures

JCC Ibarz - Computer Standards & Interfaces, 2020 - Elsevier
This paper proposes a set of JSON signed and unsigned attributes which, if incorporated
into a JSON signature, will convert it in a digital signature (JAdES) with identical capabilities …

[PDF][PDF] An Approach for Securing JSON Objects through Chaotic Synchronization

OS Gómez, RR Miranda, J EstradaGutiérrez… - Cybern. Inf …, 2022 - sciendo.com
Nowadays the interoperability of web applications is carried out by the use of data exchange
formats such as XML and JavaScript Object Notation (JSON). Due to its simplicity, JSON …

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

B Xu, S Jia, J Lin, F Zheng, Y Ma, L Liu, X Gu… - … on Research in …, 2023 - Springer
Abstract JSON Web Token (JWT) has been widely adopted to increase the security of
authentication and authorization scenarios. However, how to manage the JWT key during its …

Trustworthiness of dynamic moving sensors for secure mobile edge computing

J Yoon - Computers, 2018 - mdpi.com
Wireless sensor network is an emerging technology, and the collaboration of wireless
sensors becomes one of the active research areas for utilizing sensor data. Various sensors …

RiskControl: A Bayesian Network-based Tool to Support Risk Management in Software Projects

E Dantas, A Sousa, T Rique, L Antônio… - 2023 International …, 2023 - ieeexplore.ieee.org
Researchers have investigated several software project risk management approaches and
developed promising techniques and tools for identifying, measuring, and monitoring risks …

Cryptographic Data Formats

J Schwenk - Guide to Internet Cryptography: Security Protocols and …, 2022 - Springer
Cryptographic Data Formats Page 1 Chapter 21 Cryptographic Data Formats Abstract Two
universal cryptographic data formats have been described so far: OpenPGP in chapter 16 and …

Guide to Internet Cryptography

J Schwenk - Springer
In the last two decades, numerous research papers have considerably expanded our
knowledge of Internet cryptography, taking into account all details of the different standards …