Results 1 to 10 of about 1,934,525 (313)

Trivializing Verification of Cryptographic Protocols

open access: yesComputer Assisted Methods in Engineering and Science, 2023
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Anonymous credit cards and their collusion analysis [PDF]

open access: yes, 1996
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H.   +2 more
core   +3 more sources

Cryptographic Protocols

open access: yes, 2021
Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'
openaire   +3 more sources

Public Key Protocols over Skew Dihedral Group Rings

open access: yesMathematics, 2022
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz   +2 more
doaj   +1 more source

Security of Quantum Key Distribution with Entangled Qutrits [PDF]

open access: yes, 2002
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert's cryptographic protocol [Ekert] where qubits are replaced by qutrits ...
Cerf, Nicolas J.   +3 more
core   +2 more sources

Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [PDF]

open access: yesJisuanji kexue
Unknown cryptographic protocols are widely used for the secure transmission of sensitive information,and reversing cryptographic protocol is of great significance to both attackers and defenders.In order to efficiently reverse complex cryptographic ...
LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
doaj   +1 more source

Monitoring approach for online security of cryptographic protocol

open access: yesTongxin xuebao, 2016
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU   +5 more
doaj   +2 more sources

CAPSL and MuCAPSL

open access: yesJournal of Telecommunications and Information Technology, 2002
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj   +1 more source

Secure quantum channels with correlated twin laser beams

open access: yes, 2004
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures.
A. Ekert   +10 more
core   +1 more source

Superposition Attacks on Cryptographic Protocols [PDF]

open access: yes, 2014
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy