Some digital sigz:ature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token's tamper-resistance.
CITATION STYLE
Schneier, B., & Kelsey, J. (1997). Automatic event-stream notarization using digital signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1189, pp. 155–169). Springer Verlag. https://doi.org/10.1007/3-540-62494-5_15
Mendeley helps you to discover research relevant for your work.