We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. The distance-bounding protocol based on Russian cryptographic algorithms

    In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...

    Vladimir Belsky, Anastasiia Chichaeva, ... Kirill Tsaregorodtsev in Journal of Computer Virology and Hacking Techniques
    Article 17 May 2024
  2. Cryptographic protocol conformance testing based on domain-specific state machine

    We present a method of conformance testing of the cryptographic protocol implementations that ensures a high degree of automation of the testing...

    Article 03 April 2023
  3. Cryptographic Competitions

    Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...

    Daniel J. Bernstein in Journal of Cryptology
    Article Open access 08 December 2023
  4. A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases

    Recent progression in Information Technology facilitated the collection and storage of large amounts of data to be accessed by multiple parties in a...

    Ashutosh Saxena, P. Radha Krishna in Journal of Banking and Financial Technology
    Article 25 May 2022
  5. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  6. Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations

    This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article 15 June 2024
  7. On Cryptographic Properties of the NB-Fi Protocol

    Abstract

    In this paper, we consider the NB-Fi protocol that provides secure communication between IoT devices and control servers. It is shown that...

    E. K. Alekseev, L. R. Akhmetzyanova, ... A. I. Bondarenko in Automatic Control and Computer Sciences
    Article 01 December 2021
  8. RV-TEE: secure cryptographic protocol execution based on runtime verification

    Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks...

    Mark Vella, Christian Colombo, ... Peter Špaček in Journal of Computer Virology and Hacking Techniques
    Article Open access 05 July 2021
  9. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

    We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one...

    Benjamin Dowling, Marc Fischlin, ... Douglas Stebila in Journal of Cryptology
    Article Open access 30 July 2021
  10. RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices

    IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...

    Shreyas Srinath, G. S. Nagaraja in SN Computer Science
    Article 28 June 2024
  11. A bivariate polynomial-based cryptographic hard problem and its applications

    The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...

    Bagher Bagherpour in Designs, Codes and Cryptography
    Article 29 April 2023
  12. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
  13. Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

    IoTs are increasingly gaining popularity and prevalence due to their extensive applications across various domains. They gather data from the real...

    Article 29 February 2024
  14. Specifying a principle of cryptographic justice as a response to the problem of going dark

    Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition...

    Article Open access 05 July 2023
  15. A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...

    Siqi Lu, Jianhua Zheng, ... Chunxiang Gu in Science China Information Sciences
    Article 23 September 2022
  16. Parallel Maude-NPA for Cryptographic Protocol Analysis

    Maude-NPA is a symbolic model checker for analyzing cryptographic protocols in the Dolev-Yao strand space model modulo an equational theory defining...
    Canh Minh Do, Adrián Riesco, ... Kazuhiro Ogata in Rewriting Logic and Its Applications
    Conference paper 2022
  17. Proactive visual cryptographic schemes for general access structures

    In the modern digital era, long-term protection of digital data, stored in a server, is essential, especially when it is in the format of medical...

    Praveen K, Sabyasachi Dutta, ... Sethumadhavan M in Multimedia Tools and Applications
    Article 04 April 2023
  18. Towards the design of new cryptographic algorithm and performance evaluation measures

    Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security...

    Anum Farooq, Sana Tariq, ... Kashif Hussain Memon in Multimedia Tools and Applications
    Article 26 June 2023
  19. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  20. Cryptographic Systems Technologies

    Using the building blocks from the previous chapter, this chapter puts them together in two example systems. One of these, Transport Layer Security...
    Seth James Nielson in Discovering Cybersecurity
    Chapter 2023
Did you find what you were looking for? Share feedback.