Results 1 to 10 of about 1,929,820 (318)
Multi-Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols. [PDF]
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Kim JJ, Kim MS, Lee GJ.
europepmc +4 more sources
Security Threats and Cryptographic Protocols for Medical Wearables
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez +3 more
doaj +2 more sources
Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'
semanticscholar +4 more sources
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh +2 more
doaj +2 more sources
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly +3 more
doaj +2 more sources
A Calculus for Cryptographic Protocols: The Spi Calculus
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Abadi, Martı́n, Gordon, Andrew D.
openaire +3 more sources
Superposition Attacks on Cryptographic Protocols [PDF]
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård +3 more
openaire +6 more sources
Sequential rationality in cryptographic protocols [PDF]
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Gradwohl, Ronen +2 more
openaire +4 more sources
A Core Calculus for Equational Proofs of Cryptographic Protocols
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification.
Joshua Gancher +4 more
semanticscholar +1 more source
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real
D. Basin +3 more
semanticscholar +1 more source

