0
citations
#607
in ICLR 2024
of 2297 papers
0
Top Authors
1
Data Points

Top Authors

Abstract

The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.

Citation History

Jan 30, 2026
0