Results 241 to 250 of about 1,901,421 (313)

Cryptographic protocols

Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo   +2 more
openaire   +2 more sources

An improved version of the AAG cryptographic protocol

Groups Complex. Cryptol., 2019
An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established.
V. Roman’kov
semanticscholar   +1 more source

A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things

ACM Transactions on Embedded Computing Systems, 2019
The universality of smart-devices has brought rapid development and the significant advancement of ubiquitous applications for the Internet of Things (IoT).
Lu Zhou, Chunhua Su, Kuo-Hui Yeh
semanticscholar   +1 more source

Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain

2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018
The blockchain technology has recently attracted increasing interests in a wide range of use-cases. Among those, the management of vehicles' data and life cycle over a blockchain has sparked various research initiatives on a global scale, with the ...
Kei-Léo Brousmiche   +5 more
semanticscholar   +1 more source

Visualization of cryptographic protocols with GRACE

Journal of Visual Languages & Computing, 2008
In this paper we present GRACE (graphical representation and animation for cryptography education), a Java-based educational tool that can be used to help in teaching and understanding of cryptographic protocols. The tool adopts an active learning model that engages the learner by asking him to describe, in an exemplification of a real-world scenario ...
CATTANEO, Giuseppe   +2 more
openaire   +3 more sources

A Quantum Cryptographic Protocol for Secure Vehicular Communication

IEEE transactions on intelligent transportation systems (Print)
In foggy highways, the secure vehicular communication system can be very important in preventing traffic chaos, congestion, and accident; however, potential attackers may hack this system that can create many problems in controlling or managing the ...
Kartick Sutradhar
semanticscholar   +1 more source

Verifiable Verification in Cryptographic Protocols

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Common verification steps in cryptographic protocols, such as signature or message authentication code checks or the validation of elliptic curve points, are crucial for the overall security of the protocol. Yet implementation errors omitting these steps easily remain unnoticed, as often the protocol will function perfectly anyways.
Marc Fischlin, Felix Günther
openaire   +1 more source

Home - About - Disclaimer - Privacy