Results 1 to 10 of about 1,828,128 (311)

A Rational Approach to Cryptographic Protocols [PDF]

open access: bronzeMathematical and Computer Modelling. Volume 46, Issues 1-2, July 2007, Pages 80-87., 2010
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Pino Caballero‐Gil   +2 more
arxiv   +4 more sources

Universally composable security: a new paradigm for cryptographic protocols [PDF]

open access: greenProceedings IEEE International Conference on Cluster Computing, 2001
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is ...
Ran Canetti
openalex   +2 more sources

Security Threats and Cryptographic Protocols for Medical Wearables

open access: yesMathematics, 2022
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez   +3 more
doaj   +2 more sources

Quantum cryptographic three party protocols [PDF]

open access: greenarXiv, 2000
Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv   +3 more sources

Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]

open access: yesJournal of computing and security, 2019
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik   +3 more
core   +6 more sources

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]

open access: yesIEEE Computer Security Foundations Symposium, 2018
International audienceExclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID protocols and electronic payment protocols.
Dreier, Jannik   +3 more
core   +6 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesIACR Cryptology ePrint Archive, 2015
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core   +4 more sources

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +2 more sources

Simple, Near-Optimal Quantum Protocols for Die-Rolling [PDF]

open access: yesCryptography, 2017
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj   +4 more sources

Towards an information-theoretically safe cryptographic protocol [PDF]

open access: greenarXiv, 2006
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv   +3 more sources

Home - About - Disclaimer - Privacy