Results 51 to 60 of about 1,801,560 (284)

Guiding a general-purpose C verifier to prove cryptographic protocols [PDF]

open access: yesIEEE Computer Security Foundations Symposium, 2011
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography.
François Dupressoir   +3 more
semanticscholar   +1 more source

On Some Cryptographic Protocol

open access: yesSchedae Informaticae, 2021
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire   +3 more sources

Vulnerability of blockchain technologies to quantum attacks

open access: yesArray, 2021
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney   +1 more
doaj  

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

The Practice of Cryptographic Protocol Verification

open access: yesElectronic Notes in Theoretical Computer Science, 2003
We analyze the complexity of verifying security protocols for finite ...
openaire   +3 more sources

Monitoring approach for online security of cryptographic protocol

open access: yesTongxin xuebao, 2016
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU   +5 more
doaj   +2 more sources

Cryptographic protocols with everyday objects [PDF]

open access: yesFormal Aspects of Computing, 2014
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire   +4 more sources

A survey on the application of blockchain in cryptographic protocols

open access: yesCybersecurity
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability ...
Xiangyang Luo   +3 more
doaj   +1 more source

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

open access: yesnpj Quantum Information, 2022
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang   +14 more
doaj   +1 more source

Home - About - Disclaimer - Privacy