Results 1 to 10 of about 42,263 (229)

A Rational Approach to Cryptographic Protocols [PDF]

open access: bronzeMathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87., 2010
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Pino Caballero‐Gil   +2 more
arxiv   +6 more sources

Nonmonotonic cryptographic protocols. [PDF]

open access: greenProceedings The Computer Security Foundations Workshop VII, 1994
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
Aviel D. Rubin
  +5 more sources

A Calculus for Cryptographic Protocols: The Spi Calculus [PDF]

open access: bronzeInformation and Computation, 1999
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic ...
Martı́n Abadi, Andrew D. Gordon
openalex   +3 more sources

Quantum cryptographic three party protocols [PDF]

open access: greenarXiv, 2000
Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv   +3 more sources

On the Verification of Cryptographic Protocols

open access: goldElectronic Notes in Theoretical Computer Science, 2000
AbstractThere is a mantra telling us that authentication is difficult. The failure to design robust authentication protocols is commonly attributed to a lack of good design strategies, and to a lack of verification tools. We will argue that the problem is rather confusion about the meaning of ‘authentication’. If you do not know what you are aiming for,
Dieter Gollmann
openalex   +3 more sources

Cryptographic Authentication of Navigation Protocols [PDF]

open access: greenarXiv, 2005
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Sam Bretheim
arxiv   +3 more sources

Towards an information-theoretically safe cryptographic protocol [PDF]

open access: greenarXiv, 2006
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv   +3 more sources

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Compiling and securing cryptographic protocols [PDF]

open access: yesInformation Processing Letters, 2010
A short version was submitted to ...
Chevalier, Yannick, Rusinowitch, Michael
openaire   +5 more sources

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Home - About - Disclaimer - Privacy