Results 251 to 260 of about 1,801,560 (284)
Some of the next articles are maybe not open access.
General Cryptographic Protocols
2004The design of secure protocols that implement arbitrarily desired functionalities is a major part of modern cryptography. Taking the opposite perspective, the design of any cryptographic scheme may be viewed as the design of a secure protocol for implementing a suitable functionality. Still, we believe that it makes sense to differentiate between basic
openaire +2 more sources
Cryptographic protocols for auctions and bargaining
1994Modern mathematical cryptography provides many protocols for designing social and economic institutions. This article deals with cryptographic protocols for auctions, bargaining and arbitration. The main contribution of the protocols is in the elimination of specific types of behaviour which otherwise might undermine the desirable properties of the ...
openaire +2 more sources
A formalization of card-based cryptographic protocols via abstract machine
International Journal of Information Security, 2014T. Mizuki, Hiroki Shizuya
semanticscholar +1 more source
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
Proceedings of the IEEE, 2012Alessandro Barenghi, Hideki Taguchi
exaly
Modelling and Verification of Cryptographic Protocols
2005Special issue on Modelling and Verification of Cryptographic Protocols of the Journal of Logic and Algebraic ...
openaire +1 more source
Random Organic Nanolaser Arrays for Cryptographic Primitives
Advanced Materials, 2019Jiangang Feng, Lei Jiang, Moyuan Cao
exaly
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective Detection
IEEE Journal of Quantum Electronics, 2011B. Liu, F. Gao, Q. Wen
semanticscholar +1 more source