Language, Semantics, and Methods for Cryptographic Protocols
Federico Crazzolara, Glynn Winskel
openalex +2 more sources
Applications of Term Rewriting to Cryptographic Protocol Analysis (overview of the invited talk)
Jonathan K. Millen
openalex +1 more source
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks [PDF]
Antonio Acín+2 more
openalex +1 more source
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
D. Boneh, R. DeMillo, R. Lipton
semanticscholar +1 more source
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
A fully efficient secure quantum cryptography protocol
Xiang‐Bin Wang
openalex +2 more sources
A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
David R. Kuhn
openalex +2 more sources
A Practical Attack on a Braid Group Based Cryptographic Protocol [PDF]
Alexei Myasnikov+2 more
openalex +1 more source
Cognitive intelligence routing protocol for disaster management and underwater communication system in underwater acoustic network. [PDF]
Saleem K+6 more
europepmc +1 more source