Results 1 to 10 of about 1,858,401 (253)

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
H. Comon, Vitaly Shmatikov
semanticscholar   +3 more sources

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]

open access: greenIACR Cryptology ePrint Archive, 2015
Benjamin Dowling   +3 more
semanticscholar   +2 more sources

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]

open access: yesSci Rep
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc   +2 more sources

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms. [PDF]

open access: yesSci Rep
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Singh P, Pranav P, Dutta S.
europepmc   +2 more sources

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

Verifpal: Cryptographic Protocol Analysis for the Real World

open access: yesInternational Conference on Cryptology in India, 2020
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing ...
Nadim Kobeissi   +2 more
semanticscholar   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

open access: yesJournal of Cryptology, 2020
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)
Benjamin Dowling   +3 more
semanticscholar   +1 more source

Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic

open access: yesApplied Sciences, 2020
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Cryptographic mechanisms for secure interaction of control and measuring devices

open access: yesБезопасность информационных технологий, 2020
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy