Results 41 to 50 of about 63,614 (274)
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj +1 more source
Programming Cryptographic Protocols [PDF]
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
John D. Ramsdell+3 more
openaire +2 more sources
Key generation schemes for channel authentication in quantum key distribution protocol
Quantum key distribution (QKD) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for QKD protocols to work. Usually, the initial authentication key for this channel is pre‐shared.
Mikhail Borodin+2 more
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source
Confidential machine learning on untrusted platforms: a survey
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or ...
Sharma Sagar, Chen Keke
doaj +1 more source
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham+4 more
core +1 more source
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer+27 more
core +2 more sources
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
David Monniaux, David Monniaux
openaire +3 more sources
Special Issue on Algorithms for Cryptographic Protocols
n ...
Andreas Vogt
doaj +1 more source
The Practice of Cryptographic Protocol Verification
We analyze the complexity of verifying security protocols for finite ...
openaire +3 more sources