Language, Semantics, and Methods for Cryptographic Protocols
Federico Crazzolara, Glynn Winskel
openalex +2 more sources
Applications of Term Rewriting to Cryptographic Protocol Analysis (overview of the invited talk)
Jonathan K. Millen
openalex +1 more source
Quantum cryptographic three party protocols
Joern Mueller-Quade, Hiroyuki Imai
openalex +2 more sources
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks [PDF]
Antonio Acín+2 more
openalex +1 more source
Process Algebraic Analysis of Cryptographic Protocols
Michele Boreale+2 more
openalex +1 more source
FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY [PDF]
Karl Svozil
openalex +3 more sources
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
D. Boneh, R. DeMillo, R. Lipton
semanticscholar +1 more source
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols. [PDF]
Venkatasamy TK+3 more
europepmc +1 more source