Results 51 to 60 of about 1,839,178 (288)
Guiding a general-purpose C verifier to prove cryptographic protocols [PDF]
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography.
François Dupressoir +3 more
semanticscholar +1 more source
On Some Cryptographic Protocol
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire +3 more sources
Special Issue on Algorithms for Cryptographic Protocols
n ...
Andreas Vogt
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad +5 more
doaj +1 more source
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
David Monniaux, David Monniaux
openaire +3 more sources
The Practice of Cryptographic Protocol Verification
We analyze the complexity of verifying security protocols for finite ...
openaire +3 more sources
C# parser for extracting cryptographic protocols structure from source code
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev +1 more
doaj +1 more source
Monitoring approach for online security of cryptographic protocol
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU +5 more
doaj +2 more sources
A survey on the application of blockchain in cryptographic protocols
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability ...
Xiangyang Luo +3 more
doaj +1 more source
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang +14 more
doaj +1 more source

