Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Smart home survey on security and privacy
Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and
privacy are two prime concern in smart home networks. A threat-prone smart home can …
privacy are two prime concern in smart home networks. A threat-prone smart home can …
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
The authentication schemes based on common chip cards such as Mifare cards are still very
popular and are used in various access control systems deployed in critical infrastructure …
popular and are used in various access control systems deployed in critical infrastructure …
Security of okamoto identification scheme: a defense against ephemeral key leakage and setup
L Krzywiecki, M Kutylowski - Proceedings of the Fifth ACM International …, 2017 - dl.acm.org
We consider the situation, where an adversary may learn the ephemeral values used by the
prover within an identification protocol, aiming to get the secret keys of the user, or just to …
prover within an identification protocol, aiming to get the secret keys of the user, or just to …
Threshold kleptographic attacks on discrete logarithm based signatures
G Teşeleanu - … Conference on Cryptology and Information Security in …, 2017 - Springer
In an ℓ out of n threshold scheme, ℓ out of n members must cooperate to recover a secret. A
kleptographic attack is a backdoor which can be implemented in an algorithm and further …
kleptographic attack is a backdoor which can be implemented in an algorithm and further …
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords
M Grześkowiak, Ł Krzywiecki, K Niczyj - International Conference on …, 2023 - Springer
In this paper we demonstrate effective attacks on Human Identification Protocol with Human-
Computable Passwords (HIPHCP) presented in ISPEC'22. The protocol, which was …
Computable Passwords (HIPHCP) presented in ISPEC'22. The protocol, which was …
Identity-based signature scheme secure in ephemeral setup and leakage scenarios
Ł Krzywiecki, M Słowik, M Szala - Information Security Practice and …, 2019 - Springer
We propose the identity-based signature (IBS) scheme resilient to ephemerals leakage and
setup. The scheme is applicable to scenarios, where signers can not trust thoroughly the …
setup. The scheme is applicable to scenarios, where signers can not trust thoroughly the …
Brief announcement: anonymous credentials secure to ephemeral leakage
Ł Krzywiecki, M Wszoła, M Kutyłowski - … 2017, Beer-Sheva, Israel, June 29 …, 2017 - Springer
We present a version of Camenisch-Lysyanskaya's anonymous credential system immune
to attacks based on leakage of ephemeral values used during protocol execution. While …
to attacks based on leakage of ephemeral values used during protocol execution. While …
Deniable key establishment resistance against eKCI attacks
Ł Krzywiecki, T Wlisłocki - Security and Communication …, 2017 - Wiley Online Library
In extended Key Compromise Impersonation (eKCI) attack against authenticated key
establishment (AKE) protocols the adversary impersonates one party, having the long term …
establishment (AKE) protocols the adversary impersonates one party, having the long term …
Strongly deniable identification schemes immune to prover's and verifier's ephemeral leakage
In this paper, we consider Identification Schemes (IS) in the context of attacks against their
deniability via Fiat-Shamir transformations. We address the following issue: How to design …
deniability via Fiat-Shamir transformations. We address the following issue: How to design …
Pseudonymous signature schemes
The chapter concerns cryptographic schemes enabling to sign digital data in a
pseudonymized way. The schemes aim to provide a strong cryptographic evidence of …
pseudonymized way. The schemes aim to provide a strong cryptographic evidence of …