Results 11 to 20 of about 1,801,560 (284)

The inductive approach to verifying cryptographic protocols [PDF]

open access: yesJournal of Computer Security, 1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
Lawrence Charles Paulson
openaire   +5 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesInternational Journal of Quantum Information, 2011
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers.
Sean Hallgren, Adam Smith, Fang Song
openaire   +7 more sources

Universally composable security: a new paradigm for cryptographic protocols [PDF]

open access: greenProceedings IEEE International Conference on Cluster Computing, 2001
Ran Canetti
openalex   +2 more sources

A Core Calculus for Equational Proofs of Cryptographic Protocols

open access: yesProc. ACM Program. Lang., 2023
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification.
Joshua Gancher   +4 more
semanticscholar   +1 more source

Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols

open access: yesIEEE Security and Privacy, 2022
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real
D. Basin   +3 more
semanticscholar   +1 more source

Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

open access: yesNew generation computing, 2022
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers.
Yoshifumi Manabe, Hibiki Ono
semanticscholar   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Home - About - Disclaimer - Privacy