Results 31 to 40 of about 63,614 (274)

Denial-of-Service Resistance in Key Establishment [PDF]

open access: yes, 2007
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin   +4 more
core   +2 more sources

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj   +1 more source

Multiparty Quantum Cryptographic Protocol

open access: yesChinese Physics Letters, 2008
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire   +4 more sources

Fair Exchange in Strand Spaces [PDF]

open access: yes, 2009
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman   +2 more
core   +2 more sources

Finite key size analysis of two-way quantum cryptography [PDF]

open access: yes, 2015
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Mancini, Stefano, Shaari, Jesni Shamsul
core   +3 more sources

Distributed Cryptographic Protocols

open access: yes, 2023
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire   +2 more sources

LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols

open access: yesIEEE Access, 2019
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song   +4 more
doaj   +1 more source

Quantum and classical oblivious transfer: A comparative analysis

open access: yesIET Quantum Communication, 2021
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos   +2 more
doaj   +1 more source

Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]

open access: yes, 2011
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent   +2 more
core   +2 more sources

Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

open access: yesIEEE Access, 2019
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Home - About - Disclaimer - Privacy