Towards an information-theoretically safe cryptographic protocol [PDF]
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv +3 more sources
Cryptographic Authentication of Navigation Protocols [PDF]
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Sam Bretheim
arxiv +3 more sources
Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision [PDF]
Standard quantum cryptographic protocols are not secure if one assumes that nonlocal hidden variables exist and can be measured with arbitrary precision.
C. H. Bennett+7 more
core +2 more sources
Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik+3 more
core +8 more sources
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao+6 more
wiley +1 more source
Advances in quantum secure direct communication
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj +1 more source
Sequential rationality in cryptographic protocols [PDF]
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Ronen Gradwohl, Alon Rosen, Noam Livne
openaire +4 more sources
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj +1 more source
Malware-Resistant Protocols for Real-World Systems [PDF]
Cryptographic protocols are widely used to protect real-world systems from attacks. Paying for goods in a shop, withdrawing money or browsing the Web; all these activities are backed by cryptographic protocols.
Hackenjos, Timon
core +2 more sources