Results 21 to 30 of about 5,022 (206)
Nonmonotonic cryptographic protocols [PDF]
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
A.D. Rubin, P. Honeyman
openaire +1 more source
Trivializing Verification of Cryptographic Protocols
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Public Key Protocols over Skew Dihedral Group Rings
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz +2 more
doaj +1 more source
Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [PDF]
Unknown cryptographic protocols are widely used for the secure transmission of sensitive information,and reversing cryptographic protocol is of great significance to both attackers and defenders.In order to efficiently reverse complex cryptographic ...
LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
doaj +1 more source
Monitoring approach for online security of cryptographic protocol
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU +5 more
doaj +2 more sources
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj +1 more source
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source
Formal verification for a PMQTT protocol
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam +3 more
doaj +1 more source
Multiparty Quantum Cryptographic Protocol
12 pages, 1 .eps figure, 3 ...
Ramzan, M., Khan, M. K.
openaire +2 more sources
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source

