Results 1 to 10 of about 96,237 (302)

A Rational Approach to Cryptographic Protocols [PDF]

open access: bronzeMathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87., 2010
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Asokan   +9 more
arxiv   +7 more sources

Compiling and securing cryptographic protocols [PDF]

open access: yesInformation Processing Letters, 2009
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role.
Abadi   +12 more
core   +12 more sources

Distributed Cryptographic Protocols [PDF]

open access: yes, 2023
[ES] La confianza es la base de las sociedades modernas. Sin embargo, las relaciones basadas en confianza son difíciles de establecer y pueden ser explotadas fácilmente con resultados devastadores.
Larriba Flor, Antonio Manuel
core   +3 more sources

Nonmonotonic cryptographic protocols. [PDF]

open access: greenProceedings The Computer Security Foundations Workshop VII, 1994
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
Aviel D. Rubin
  +5 more sources

A Calculus for Cryptographic Protocols: The Spi Calculus [PDF]

open access: bronzeInformation and Computation, 1999
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic ...
Martı́n Abadi, Andrew D. Gordon
openalex   +3 more sources

Quantum cryptographic three party protocols [PDF]

open access: greenarXiv, 2000
Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv   +3 more sources

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +2 more sources

Simple, Near-Optimal Quantum Protocols for Die-Rolling [PDF]

open access: yesCryptography, 2017
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj   +4 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesInternational Journal of Quantum Information, 2015
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core   +7 more sources

On the Verification of Cryptographic Protocols

open access: goldElectronic Notes in Theoretical Computer Science, 2000
AbstractThere is a mantra telling us that authentication is difficult. The failure to design robust authentication protocols is commonly attributed to a lack of good design strategies, and to a lack of verification tools. We will argue that the problem is rather confusion about the meaning of ‘authentication’. If you do not know what you are aiming for,
Dieter Gollmann
openalex   +3 more sources

Home - About - Disclaimer - Privacy