Results 1 to 10 of about 1,828,128 (311)
A Rational Approach to Cryptographic Protocols [PDF]
Mathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87., 2010This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Pino Caballero‐Gil+2 more
arxiv +4 more sources
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Proceedings IEEE International Conference on Cluster Computing, 2001We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is ...
Ran Canetti
openalex +2 more sources
Security Threats and Cryptographic Protocols for Medical Wearables
Mathematics, 2022In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez+3 more
doaj +2 more sources
Quantum cryptographic three party protocols [PDF]
arXiv, 2000Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv +3 more sources
Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]
Journal of computing and security, 2019International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik+3 more
core +6 more sources
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]
IEEE Computer Security Foundations Symposium, 2018International audienceExclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID protocols and electronic payment protocols.
Dreier, Jannik+3 more
core +6 more sources
Classical Cryptographic Protocols in a Quantum World [PDF]
IACR Cryptology ePrint Archive, 2015Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core +4 more sources
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
IACR Transactions on Symmetric Cryptology, 2020While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly+3 more
doaj +2 more sources
Simple, Near-Optimal Quantum Protocols for Die-Rolling [PDF]
Cryptography, 2017Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj +4 more sources
Towards an information-theoretically safe cryptographic protocol [PDF]
arXiv, 2006We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv +3 more sources