Results 1 to 10 of about 1,901,421 (313)

A rational approach to cryptographic protocols [PDF]

open access: bronzeMathematical and Computer Modelling, 2007
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties.
Pino Caballero‐Gil   +2 more
core   +5 more sources

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj   +2 more sources

Fair Exchange in Strand Spaces [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2009
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman
doaj   +5 more sources

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM [PDF]

open access: yesScientific Reports
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li   +4 more
doaj   +2 more sources

Universally composable security: a new paradigm for cryptographic protocols [PDF]

open access: greenProceedings IEEE International Conference on Cluster Computing, 2001
Ran Canetti
openalex   +2 more sources

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +2 more sources

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Verifpal: Cryptographic Protocol Analysis for the Real World

open access: yesInternational Conference on Cryptology in India, 2020
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing ...
Nadim Kobeissi   +2 more
semanticscholar   +1 more source

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

open access: yesJournal of Cryptology, 2020
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)
Benjamin Dowling   +3 more
semanticscholar   +1 more source

Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic

open access: yesApplied Sciences, 2020
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Home - About - Disclaimer - Privacy