Results 191 to 200 of about 7,441 (248)

Verifying Cryptographic Protocols

open access: yesVerifying Cryptographic Protocols
openaire  

Cryptographic protocols

Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo   +2 more
openaire   +1 more source

Cryptographic Protocols

2017
This chapter is concerned with cryptographic protocols. We begin with an explanation of what components a cryptographic protocol consists of. We then illustrate the complexity of designing a secure cryptographic protocol by considering an artificially simple scenario, for which we propose and analyse seven candidate protocols.
openaire   +1 more source

Stateless Cryptographic Protocols

2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Secure computation protocols inherently involve multiple rounds of interaction among the parties where, typically a party has to keep a state about what has happened in the protocol so far and then \emph{wait} for the other party to respond. We study if this is inherent. In particular, we study the possibility of designing cryptographic protocols where
Vipul Goyal, Hemanta K. Maji
openaire   +1 more source

Fischer's cryptographic protocols

Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003
This note is prepared for Michael Fischer's 60th birthday celebration at PODC 2003. In it, I briefly describe some of Michael Fischer's work on distributed cryptographic protocols.
openaire   +1 more source

Home - About - Disclaimer - Privacy