Results 1 to 10 of about 63,614 (274)

A Rational Approach to Cryptographic Protocols [PDF]

open access: bronzeMathematical and Computer Modelling, 2010
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties.
Asokan   +9 more
core   +4 more sources

Compiling and securing cryptographic protocols [PDF]

open access: yesInformation Processing Letters, 2009
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role.
Abadi   +12 more
core   +10 more sources

Nonmonotonic cryptographic protocols. [PDF]

open access: greenProceedings The Computer Security Foundations Workshop VII, 1994
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
Aviel D. Rubin
  +5 more sources

A Calculus for Cryptographic Protocols: The Spi Calculus [PDF]

open access: bronzeInformation and Computation, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Martı́n Abadi, Andrew D. Gordon
openalex   +4 more sources

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +2 more sources

On the Verification of Cryptographic Protocols

open access: goldElectronic Notes in Theoretical Computer Science, 2000
AbstractThere is a mantra telling us that authentication is difficult. The failure to design robust authentication protocols is commonly attributed to a lack of good design strategies, and to a lack of verification tools. We will argue that the problem is rather confusion about the meaning of ‘authentication’. If you do not know what you are aiming for,
Dieter Gollmann
openalex   +3 more sources

Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]

open access: yesJournal of Computer Security, 2019
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik   +3 more
core   +9 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesInternational Journal of Quantum Information, 2015
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core   +7 more sources

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Home - About - Disclaimer - Privacy