Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorLow, M.R.
dc.date.accessioned2009-06-18T08:28:16Z
dc.date.available2009-06-18T08:28:16Z
dc.date.issued1995
dc.identifier.citationChristianson , B & Low , M R 1995 , ' Key-spoofing attacks on nested signature blocks ' , Electronics Letters , vol. 31 , no. 13 , pp. 1043-1044 . https://doi.org/10.1049/el:19950719
dc.identifier.issn0013-5194
dc.identifier.otherdspace: 2299/3609
dc.identifier.urihttp://hdl.handle.net/2299/3609
dc.descriptionThe copy of record is available at IET Digital Library. [Full text of this article is not available in the UHRA]
dc.description.abstractFor a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, using a theft-proof capability mechanism as an illustration. A modification to public key certificates is then proposed to eliminate this threat.en
dc.language.isoeng
dc.relation.ispartofElectronics Letters
dc.subjectpublic key cryptography
dc.titleKey-spoofing attacks on nested signature blocksen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1049/el:19950719
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record