Results 1 to 10 of about 1,901,421 (313)
A rational approach to cryptographic protocols [PDF]
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties.
Pino Caballero‐Gil +2 more
core +5 more sources
Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj +2 more sources
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman
doaj +5 more sources
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM [PDF]
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li +4 more
doaj +2 more sources
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Ran Canetti
openalex +2 more sources
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh +2 more
doaj +2 more sources
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський +1 more
doaj +1 more source
Verifpal: Cryptographic Protocol Analysis for the Real World
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing ...
Nadim Kobeissi +2 more
semanticscholar +1 more source
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)
Benjamin Dowling +3 more
semanticscholar +1 more source
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj +1 more source

