Results 161 to 170 of about 1,862,454 (331)
An Analysis of the CAVES Attestation Protocol using CPSA [PDF]
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.
arxiv
Secure Composition of Cryptographic Protocols [PDF]
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire +3 more sources
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj
Key Management in Wireless Sensor Networks
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency.
Ismail Mansour+2 more
doaj +1 more source
Deep Ocean: A blockchain-agnostic dark pool protocol [PDF]
We introduce a new cryptographic protocol, called Deep Ocean, that implements a blockchain-agnostic dark pool for cryptocurrencies. Deep Ocean is a layer-two protocol, meaning that it can work with any two cryptocurrencies, as long as there exists an underlying settlement mechanism, for example performing atomic swaps.
arxiv
Simulatable security for quantum protocols
The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a ...
Unruh, Dominique
core
Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis
Tao Shang, Ke Li, Jianwei Liu
doaj +1 more source
Secure quantum cryptographic network based on quantum key distribution [PDF]
We present a protocol for quantum cryptographic network consisting of a quantum network center and many users, in which any pair of parties with members chosen from the whole users on request can secure a quantum key distribution by help of the center. The protocol is based on the quantum authentication scheme given by Barnum et al. [Proc.
arxiv
Estimators in Cryptography [PDF]
One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94 ...
arxiv