Results 11 to 20 of about 1,839,178 (288)

The inductive approach to verifying cryptographic protocols [PDF]

open access: yesJournal of Computer Security, 1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL.
Lawrence Charles Paulson
semanticscholar   +5 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesInternational Journal of Quantum Information, 2011
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Sean Hallgren, Adam D. Smith, F. Song
semanticscholar   +7 more sources

Universally composable security: a new paradigm for cryptographic protocols [PDF]

open access: greenProceedings IEEE International Conference on Cluster Computing, 2001
Ran Canetti
openalex   +2 more sources

A Core Calculus for Equational Proofs of Cryptographic Protocols

open access: yesProc. ACM Program. Lang., 2023
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification.
Joshua Gancher   +4 more
semanticscholar   +1 more source

Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols

open access: yesIEEE Security and Privacy, 2022
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real
D. Basin   +3 more
semanticscholar   +1 more source

Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

open access: yesNew generation computing, 2022
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers.
Yoshifumi Manabe, Hibiki Ono
semanticscholar   +1 more source

Compiling and securing cryptographic protocols [PDF]

open access: yesInformation Processing Letters, 2010
A short version was submitted to ...
Chevalier, Yannick, Rusinowitch, Michael
openaire   +3 more sources

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek PiÄ…tkowski, Sabina Szymoniak
doaj   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Home - About - Disclaimer - Privacy