Results 131 to 140 of about 96,237 (302)
On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos+2 more
doaj
Extending cryptographic logics of belief to key agreement protocols [PDF]
Paul C. van Oorschot
openalex +1 more source
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing [PDF]
Automated Cryptographic Validation Protocol (ACVP) is an existing protocol that is used to validate a software or hardware cryptographic module automatically. In this work, we present a system providing the method and tools to produce well-covering tests in ACVP format for cryptographic libraries.
arxiv
An Analysis of the CAVES Attestation Protocol using CPSA [PDF]
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.
arxiv
Secure Composition of Cryptographic Protocols [PDF]
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire +3 more sources
Deep Ocean: A blockchain-agnostic dark pool protocol [PDF]
We introduce a new cryptographic protocol, called Deep Ocean, that implements a blockchain-agnostic dark pool for cryptocurrencies. Deep Ocean is a layer-two protocol, meaning that it can work with any two cryptocurrencies, as long as there exists an underlying settlement mechanism, for example performing atomic swaps.
arxiv
Simulatable security for quantum protocols
The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a ...
Unruh, Dominique
core
This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks.
Pranita Bhide+2 more
wiley +1 more source
Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis
Tao Shang, Ke Li, Jianwei Liu
doaj +1 more source
Secure quantum cryptographic network based on quantum key distribution [PDF]
We present a protocol for quantum cryptographic network consisting of a quantum network center and many users, in which any pair of parties with members chosen from the whole users on request can secure a quantum key distribution by help of the center. The protocol is based on the quantum authentication scheme given by Barnum et al. [Proc.
arxiv