message forgery attack 消息伪造攻击
common forgery attack 联合伪造攻击
insider forgery attack 内部伪造攻击
universal forgery attack 无条件伪造攻击
The modular method can be used to search the second-preimage of hash functions 50, and to attack HMAC and NMAC(forgery attack and key recovery attak) 55.
模差分方法还可以用来寻找杂凑算法的第二原根50,攻击HMAC和NMAC(伪造攻击和恢复密钥攻击)55。
参考来源 - 对杂凑函数和分组密码算法的分析Through the analysis of two threshold proxy signature schemes, we proved that Q-C-X scheme can’t resist forgery attack and public key substitute attack, and T-H-Y scheme can’t stand up to forgery attack from original signer.
2 对两个代理盲数字签名方案进行了分析,证明了T-L-T方案和L-A方案不能抵抗伪造攻击和不具有不可链接性。 提出了两种新的代理盲数字签名方案,新方案满足代理盲数字签名方案的安全性要求。
参考来源 - 代理签名方案设计与分析·2,447,543篇论文数据,部分数据来源于NoteExpress
A forgery attack is presented on the self-certified signature scheme.
本文对一种自证明签名方案实施了伪造攻击。
Improved scheme has advantages of nonrepudiation, against he original signer's forgery attack and public key substitution attack etc.
改进的方案具有不可否认性,以及抵抗原签名人的伪造攻击和公钥替换攻击等优点。
However, their scheme is insecure by presenting a forgery attack, any receiver can impersonate the proxy signer to sign any message without holding the responsibility.
该文给出的一种攻击方案表明他们的方案是不安全的,任何代理签名的接收者都可以假冒代理人对任意的消息生成有效的签名。
应用推荐