Results 151 to 160 of about 62,745 (179)
Some of the next articles are maybe not open access.

Background of Cryptographic Protocols

2012
Some background knowledge including preliminary knowledge, cryptographic primitive knowledge, cryptographic protocol knowledge, cryptographic protocol security knowledge, and communication threat model knowledge are briefly introduced.
Kefei Chen, Ling Dong
openaire   +2 more sources

Fischer's cryptographic protocols

Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003
This note is prepared for Michael Fischer's 60th birthday celebration at PODC 2003. In it, I briefly describe some of Michael Fischer's work on distributed cryptographic protocols.
openaire   +2 more sources

Cryptographic protocols and voting

1994
Three protocols related to computer voting are presented. First protocol is an efficient ANDOS protocol which is based on a natural cryptographic assumption. The other two protocols attack a difficult problem in computer voting: buying of votes. We manage to solve this problem but our protocols are impractical in large-scale elections.
Valtteri Niemi, Ari Renvall
openaire   +2 more sources

Cryptography and cryptographic protocols

Distributed Computing, 2003
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes.
openaire   +2 more sources

Probabilistic Termination and Composability of Cryptographic Protocols

Journal of Cryptology, 2016
When analyzing the round complexity of multi-party computation MPC, one often overlooks the fact that underlying resources, such as a broadcast channel, can by themselves be expensive to implement. For example, it is impossible to implement a broadcast channel by a deterministic protocol in a sub-linear in the number of corrupted parties number of ...
Cohen, Ran   +3 more
openaire   +5 more sources

A Formal Language for Cryptographic Protocol Requirements

Designs, Codes and Cryptography, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Paul Syverson, Catherine Meadows
openaire   +2 more sources

Cryptographic Protocols Analysis in Event B

2010
We consider the proof-based development of cryptographic protocols satisfying security properties. For instance, the model of Dolev- Yao provides a way to integrate a description of possible attacks, when designing a protocol. We use existing protocols and want to provide a systematic way to prove but also to design cryptographic protocols; moreover ...
Benaissa, Nazim, Méry, Dominique
openaire   +3 more sources

Analyzing a Cryptographic Protocol

2017
Web services such as email, photo, social networks, internet commerce, and online banking require that entities authenticate themselves. Scrooge McDuck must be sure that he (it?) is communicating with the bank, and not with some bad guy with a look-a-like web page.
openaire   +2 more sources

Verifying Cryptographic Protocols with Subterms Constraints

2007
Known protocol analysis techniques consider protocols where some piece of information expected in a protocol message is located at a fixed position. However this is too restrictive to model web-services where messages are XML semi-structured documents and where significant information (such as name, signature, ...) has to be extracted from nodes ...
Chevalier, Yannick   +2 more
openaire   +2 more sources

Types for Cryptographic Protocols

2002
One of the many different approaches to proving properties of a cryptographic security protocol is to encode it within a process calculus [6],[7],[11],[12],[14],[20], and then to apply standard techniques from concurrency theory such as modelchecking [19] or equational reasoning [4],[5],[8],[9],[13],[15].
openaire   +2 more sources

Home - About - Disclaimer - Privacy