Results 11 to 20 of about 1,801,560 (284)
The inductive approach to verifying cryptographic protocols [PDF]
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
Lawrence Charles Paulson
openaire +5 more sources
Classical Cryptographic Protocols in a Quantum World [PDF]
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers.
Sean Hallgren, Adam Smith, Fang Song
openaire +7 more sources
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Ran Canetti
openalex +2 more sources
Security and Composition of Multiparty Cryptographic Protocols [PDF]
Ran Canetti
openalex +2 more sources
A Core Calculus for Equational Proofs of Cryptographic Protocols
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification.
Joshua Gancher+4 more
semanticscholar +1 more source
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real
D. Basin+3 more
semanticscholar +1 more source
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers.
Yoshifumi Manabe, Hibiki Ono
semanticscholar +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao+6 more
wiley +1 more source
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Advances in quantum secure direct communication
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj +1 more source