Attack model for verification of interval security properties for smart card C codes

Author(s):  
P. Berthomé ◽  
K. Heydemann ◽  
X. Kauffmann-Tourkestansky ◽  
J.-F. Lalande
2011 ◽  
Vol 255-260 ◽  
pp. 2197-2202
Author(s):  
Hong Jun He ◽  
Li Luo ◽  
Yang Wang ◽  
Zhi Peng Duan ◽  
Zhi He Fang ◽  
...  

With the development of computer technology and network application, the safety of application has become one of the most important research problems in the field of information security. Firstly, the paper analyzes malicious attack approaches for applications. Secondly, this article proposes an application anti-attack model (AAM), and further presents the formal description of the model. Finally, this paper represents its good security properties and proves them.


Author(s):  
Uwe Hansmann ◽  
Martin S. Nicklous ◽  
Thomas Schäck ◽  
Frank Seliger

2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Sign in / Sign up

Export Citation Format

Share Document