Results 1 to 10 of about 1,813,060 (277)

Quantum cryptographic three party protocols [PDF]

open access: greenarXiv, 2000
Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv   +3 more sources

Universally composable security: a new paradigm for cryptographic protocols [PDF]

open access: greenProceedings IEEE International Conference on Cluster Computing, 2001
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is ...
Ran Canetti
openalex   +2 more sources

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj   +2 more sources

A Rational Approach to Cryptographic Protocols [PDF]

open access: bronzeMathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87., 2010
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Pino Caballero‐Gil   +2 more
arxiv   +2 more sources

Cryptographic Authentication of Navigation Protocols [PDF]

open access: greenarXiv, 2005
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Sam Bretheim
arxiv   +3 more sources

Towards an information-theoretically safe cryptographic protocol [PDF]

open access: greenarXiv, 2006
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv   +3 more sources

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +2 more sources

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM [PDF]

open access: yesScientific Reports
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li   +4 more
doaj   +2 more sources

The Inductive Approach to Verifying Cryptographic Protocols [PDF]

open access: yesJournal of computing and security, 2021
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL.
Lawrence Charles Paulson
semanticscholar   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy