Results 11 to 20 of about 1,901,421 (313)
Multiparty Quantum Cryptographic Protocol [PDF]
We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding ...
M. Ramzan, M. K. Khan
semanticscholar +5 more sources
Nonmonotonic cryptographic protocols. [PDF]
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
Aviel D. Rubin
+5 more sources
A Calculus for Cryptographic Protocols: The Spi Calculus [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Martı́n Abadi, Andrew D. Gordon
openalex +4 more sources
On the Verification of Cryptographic Protocols
AbstractThere is a mantra telling us that authentication is difficult. The failure to design robust authentication protocols is commonly attributed to a lack of good design strategies, and to a lack of verification tools. We will argue that the problem is rather confusion about the meaning of ‘authentication’. If you do not know what you are aiming for,
Dieter Gollmann
openalex +3 more sources
Compiling and securing cryptographic protocols [PDF]
A short version was submitted to ...
Chevalier, Yannick, Rusinowitch, Michael
openaire +3 more sources
Sequential rationality in cryptographic protocols [PDF]
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Ronen Gradwohl, Alon Rosen, Noam Livne
openaire +4 more sources
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source
Superposition Attacks on Cryptographic Protocols [PDF]
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård +4 more
openaire +5 more sources
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko +1 more
doaj +1 more source
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
Nowadays, technological advances provide people with more facilities and luxuries in life. Medicine is no exception; for example, different wireless sensors can be used to monitor patients’ state of health.
Kevin Andrae Delgado-Vargas +2 more
doaj +1 more source

