Results 41 to 50 of about 1,929,820 (318)
The inductive approach to verifying cryptographic protocols [PDF]
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL.
Lawrence Charles Paulson
semanticscholar +1 more source
Finite key size analysis of two-way quantum cryptography [PDF]
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel.
Mancini, Stefano, Shaari, Jesni Shamsul
core +3 more sources
Nanotechnology and cryptographic protocols: issues and possible solutions
Nanotechnology has provided an immense increment in computational power. This high computational strength is very dangerous for existing cryptographic protocols, and the Data Encryption Standard al...
Varun Shukla +2 more
semanticscholar +1 more source
Timed Analysis of Security Protocols [PDF]
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different ...
Corin, R. +3 more
core +13 more sources
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song +4 more
doaj +1 more source
Quantum and classical oblivious transfer: A comparative analysis
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos +2 more
doaj +1 more source
Analysis of Cryptographic Protocol by Dynamic Epistemic Logic
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj +1 more source
Key generation schemes for channel authentication in quantum key distribution protocol
Quantum key distribution (QKD) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for QKD protocols to work. Usually, the initial authentication key for this channel is pre‐shared.
Mikhail Borodin +2 more
doaj +1 more source
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols
The classical Bloom filter data structure is a crucial component of hundreds of cryptographic protocols. It has been used in privacy preservation and secure computation settings, often in conjunction with the (somewhat) homomorphic properties of ciphers ...
L. Calderoni, P. Palmieri, D. Maio
semanticscholar +1 more source
Confidential machine learning on untrusted platforms: a survey
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or ...
Sharma Sagar, Chen Keke
doaj +1 more source

