Results 11 to 20 of about 96,237 (302)

Towards an information-theoretically safe cryptographic protocol [PDF]

open access: greenarXiv, 2006
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv   +3 more sources

Cryptographic Authentication of Navigation Protocols [PDF]

open access: greenarXiv, 2005
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Sam Bretheim
arxiv   +3 more sources

Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision [PDF]

open access: green, 2006
Standard quantum cryptographic protocols are not secure if one assumes that nonlocal hidden variables exist and can be measured with arbitrary precision.
C. H. Bennett   +7 more
core   +2 more sources

Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]

open access: yesJournal of Computer Security, 2019
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik   +3 more
core   +8 more sources

Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework

open access: yesApplied Sciences, 2023
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Advances in quantum secure direct communication

open access: yesIET Quantum Communication, 2021
The practical implementation of quantum secure direct communication (QSDC) will undoubtedly be a milestone in the development of quantum cryptography.
Piotr Zawadzki
doaj   +1 more source

Sequential rationality in cryptographic protocols [PDF]

open access: yesACM Transactions on Economics and Computation, 2010
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Ronen Gradwohl, Alon Rosen, Noam Livne
openaire   +4 more sources

Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic

open access: yesApplied Sciences, 2020
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Malware-Resistant Protocols for Real-World Systems [PDF]

open access: yes, 2023
Cryptographic protocols are widely used to protect real-world systems from attacks. Paying for goods in a shop, withdrawing money or browsing the Web; all these activities are backed by cryptographic protocols.
Hackenjos, Timon
core   +2 more sources

Home - About - Disclaimer - Privacy