Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:memics2016 [2016-09-02 15:02] – mukrop | public:papers:memics2016 [2023-08-12 21:05] (current) – xukrop | ||
---|---|---|---|
Line 5: | Line 5: | ||
**Primary contact:** Martin Ukrop < | **Primary contact:** Martin Ukrop < | ||
- | **Abstract: | + | **Abstract: |
- | but often lack basic usability features making them prone to uninten- | + | |
- | tional | + | |
- | state-of-the-art designs. Analyzing 52 candidates of the current CAESAR | + | |
- | competition has shown none of them have avalanche effect in authenti- | + | |
- | cation | + | |
- | Although not directly decreasing their security profile, this hints at their | + | |
- | security usability being less than perfect.// | + | |
- | * Conference page: [[https://www.usenix.org/conference/ | + | * Conference page: [[http://www.memics.cz/2016/|MEMICS |
- | * Download author | + | * Author |
- | * Download extended version of paper: {{:public:papers:UsenixSec16_1MRSAKeys_TRFIMU_201603.pdf|FIMU-RS-2016-03}} (technical report, FI MUNI) | + | * Conference |
- | * Download | + | * Raw experiment data: [[https:// |
- | * Download | + | |
- | **Bibtex (regular paper):** | + | |
- | @inproceedings{1mrsa_usenix2016, | + | **Bibtex (regular paper)** |
- | | + | @InProceedings{2016-memics-ukrop, |
- | title = {The Million-Key Question – Investigating the Origins of RSA Public Keys}, | + | |
- | | + | |
year = {2016}, | year = {2016}, | ||
- | pages = {893--910}, | + | title = {Avalanche Effect in Improperly Initialized CAESAR Candidates}, |
- | isbn = {978-1-931971-32-4}, | + | |
- | | + | |
- | | + | eventtitle |
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | pages = {72-81}, | ||
+ | doi = {10.4204/ | ||
+ | } |