Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage}
Apple's iMessage is one of the most widely-deployed end-to-end encrypted messaging
protocols. Despite its broad deployment, the encryption protocols used by iMessage have …
protocols. Despite its broad deployment, the encryption protocols used by iMessage have …
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …
as a service over the Internet. The major motivation behind the cloud setup is economic …
FDIPP: false data injection prevention protocol for smart Grid distribution systems
H Hittini, A Abdrabou, L Zhang - Sensors, 2020 - mdpi.com
In this paper, a false data injection prevention protocol (FDIPP) for smart grid distribution
systems is proposed. The protocol is designed to work over a novel hierarchical …
systems is proposed. The protocol is designed to work over a novel hierarchical …
SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations
With the growing interest in privacy-enhancing technologies, we are seeing a
complementary growth in the desire to build and deploy complex cryptographic systems that …
complementary growth in the desire to build and deploy complex cryptographic systems that …
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol
G Avoine, L Ferreira - Journal of Cryptology, 2025 - Springer
We describe in this paper how to perform a padding oracle attack against the GlobalPlatform
SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in …
SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in …
Automating the development of chosen ciphertext attacks
In this work we investigate the problem of automating the development of adaptive chosen
ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous …
ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous …
On the (in-) security of javascript object signing and encryption
D Detering, J Somorovsky, C Mainka… - Proceedings of the 1st …, 2017 - dl.acm.org
JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the
web used for application configuration, cross-and same-origin data exchange, as well as in …
web used for application configuration, cross-and same-origin data exchange, as well as in …
Post-quantum XML and SAML Single Sign-On
J Müller, J Oupický - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Extensible Markup Language (XML) is one of the most popular serialization
languages. Since many security protocols are built using XML, it also provides cryptographic …
languages. Since many security protocols are built using XML, it also provides cryptographic …
RESTful is not secure
T Yarygina - Applications and Techniques in Information Security …, 2017 - Springer
The shift in web service design towards the REST paradigm has spawned a series of
security concerns. To date there has been no general agreement on how the REST …
security concerns. To date there has been no general agreement on how the REST …
Adidos–adaptive and intelligent fully-automatic detection of denial-of-service weaknesses in web services
C Altmeier, C Mainka, J Somorovsky… - Data Privacy Management …, 2016 - Springer
Abstract Denial-of-Service (DoS) attacks aim to affect availability of applications. They can
be executed using several techniques. Most of them are based upon a huge computing …
be executed using several techniques. Most of them are based upon a huge computing …