Results 11 to 20 of about 1,929,820 (318)

A Rational Approach to Cryptographic Protocols [PDF]

open access: yesMathematical and Computer Modelling, 2007
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Caballero-Gil, P.   +2 more
openaire   +4 more sources

Verification of stateful cryptographic protocols with exclusive OR [PDF]

open access: yesJournal of computing and security, 2019
In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR. In
Jannik Dreier   +3 more
semanticscholar   +7 more sources

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yesIACR Cryptology ePrint Archive, 2011
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Sean Hallgren, Adam D. Smith, F. Song
semanticscholar   +5 more sources

Simple, Near-Optimal Quantum Protocols for Die-Rolling [PDF]

open access: yesCryptography, 2017
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj   +4 more sources

Automated Verification of Equivalence Properties of Cryptographic Protocols [PDF]

open access: yesACM Transactions on Computational Logic, 2012
The original publication is available at www.springerlink.comInternational audienceIndistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity of cryptographic protocols.
Rohit Chadha   +3 more
semanticscholar   +5 more sources

Trivializing Verification of Cryptographic Protocols

open access: yesComputer Assisted Methods in Engineering and Science, 2023
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

open access: yesNew generation computing, 2022
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers.
Yoshifumi Manabe, Hibiki Ono
semanticscholar   +1 more source

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Vulnerability of blockchain technologies to quantum attacks

open access: yesArray, 2021
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy