Results 11 to 20 of about 1,929,820 (318)
A Rational Approach to Cryptographic Protocols [PDF]
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Caballero-Gil, P. +2 more
openaire +4 more sources
Verification of stateful cryptographic protocols with exclusive OR [PDF]
In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR. In
Jannik Dreier +3 more
semanticscholar +7 more sources
Classical Cryptographic Protocols in a Quantum World [PDF]
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Sean Hallgren, Adam D. Smith, F. Song
semanticscholar +5 more sources
Simple, Near-Optimal Quantum Protocols for Die-Rolling [PDF]
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj +4 more sources
Automated Verification of Equivalence Properties of Cryptographic Protocols [PDF]
The original publication is available at www.springerlink.comInternational audienceIndistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity of cryptographic protocols.
Rohit Chadha +3 more
semanticscholar +5 more sources
Trivializing Verification of Cryptographic Protocols
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers.
Yoshifumi Manabe, Hibiki Ono
semanticscholar +1 more source
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Advances in quantum secure direct communication
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj +1 more source
Vulnerability of blockchain technologies to quantum attacks
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney +1 more
doaj +1 more source

