Proceedings of the 4th International Conference on Information Systems Security and Privacy 2018
DOI: 10.5220/0006609100830095
|View full text |Cite
|
Sign up to set email alerts
|

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…To protect implementations against remote timing attacks [3], the time-cost of the multiplication is usually t c , a constant that depends on the chosen curve c. Thus, the time-cost of our protocol's implementation is constant in t c . We do not have measures over our protocol performances (we are currently implementing our solution in C# atop the Microsoft .NET framework), but from previous experiences with more complex protocols using exponentiation, as the one documented in [4], we expect the overhead on the user and on the login server to be negligible.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To protect implementations against remote timing attacks [3], the time-cost of the multiplication is usually t c , a constant that depends on the chosen curve c. Thus, the time-cost of our protocol's implementation is constant in t c . We do not have measures over our protocol performances (we are currently implementing our solution in C# atop the Microsoft .NET framework), but from previous experiences with more complex protocols using exponentiation, as the one documented in [4], we expect the overhead on the user and on the login server to be negligible.…”
Section: Methodsmentioning
confidence: 99%
“…To the best of our knowledge, the protocol that we describe here is novel, but the motivation of the work is rooted in previous research of ours [4].…”
Section: Previous Work and Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…In a conference version of this work [7], we took on the task to discuss the part of the problem regarding "to withstand [..] code modification of the computer system".…”
Section: Juels and Rivest's Honeywords Systemmentioning
confidence: 99%