Results 1 to 10 of about 7,358 (260)

Multi-exponentiation (cryptographic protocols) [PDF]

open access: greenIEE Proceedings - Computers and Digital Techniques, 1994
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
S.-M. Yen, C.-S. Laih, A.K. Lenstra
openaire   +3 more sources

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM [PDF]

open access: yesScientific Reports
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li   +4 more
doaj   +2 more sources

TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS

open access: yesInformation and Telecommunication Sciences, 2023
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська   +2 more
doaj   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic

open access: yesApplied Sciences, 2020
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Cryptographic mechanisms for secure interaction of control and measuring devices

open access: yesБезопасность информационных технологий, 2020
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko   +1 more
doaj   +1 more source

Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications

open access: yesApplied Sciences, 2023
Nowadays, technological advances provide people with more facilities and luxuries in life. Medicine is no exception; for example, different wireless sensors can be used to monitor patients’ state of health.
Kevin Andrae Delgado-Vargas   +2 more
doaj   +1 more source

A Secure and Fast Access Protocol for Collecting Terminal in Power Internet of Things based on Symmetric Cryptographic Algorithm [PDF]

open access: yesE3S Web of Conferences, 2021
The development of Power Internet of Things has brought a variety of access requirements for massive collecting terminals. Based on the characteristics of security attributes of Power Internet of Things, this paper proposes a secure access protocol based
Zhai Feng   +4 more
doaj   +1 more source

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

open access: yesIEEE Access, 2019
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Home - About - Disclaimer - Privacy