0
citations
#2278
in ICML 2025
of 3340 papers
5
Top Authors
3
Data Points
Topics
Abstract
The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.
Citation History
Jan 30, 2026
0
Feb 13, 2026
0
Feb 13, 2026
0