Results 31 to 40 of about 63,614 (274)
Denial-of-Service Resistance in Key Establishment [PDF]
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin+4 more
core +2 more sources
Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj +1 more source
Multiparty Quantum Cryptographic Protocol
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire +4 more sources
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman+2 more
core +2 more sources
Finite key size analysis of two-way quantum cryptography [PDF]
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Mancini, Stefano, Shaari, Jesni Shamsul
core +3 more sources
Distributed Cryptographic Protocols
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire +2 more sources
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song+4 more
doaj +1 more source
Quantum and classical oblivious transfer: A comparative analysis
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos+2 more
doaj +1 more source
Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent+2 more
core +2 more sources
Analysis of Cryptographic Protocol by Dynamic Epistemic Logic
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj +1 more source