Search
Search Results
-
The distance-bounding protocol based on Russian cryptographic algorithms
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...
-
Cryptographic protocol conformance testing based on domain-specific state machine
We present a method of conformance testing of the cryptographic protocol implementations that ensures a high degree of automation of the testing...
-
Cryptographic Competitions
Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...
-
A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases
Recent progression in Information Technology facilitated the collection and storage of large amounts of data to be accessed by multiple parties in a...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...
-
On Cryptographic Properties of the NB-Fi Protocol
AbstractIn this paper, we consider the NB-Fi protocol that provides secure communication between IoT devices and control servers. It is shown that...
-
RV-TEE: secure cryptographic protocol execution based on runtime verification
Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks...
-
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one...
-
RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...
-
A bivariate polynomial-based cryptographic hard problem and its applications
The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...
-
Securing edge computing using cryptographic schemes: a review
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...
-
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
IoTs are increasingly gaining popularity and prevalence due to their extensive applications across various domains. They gather data from the real...
-
Specifying a principle of cryptographic justice as a response to the problem of going dark
Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition...
-
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...
-
Parallel Maude-NPA for Cryptographic Protocol Analysis
Maude-NPA is a symbolic model checker for analyzing cryptographic protocols in the Dolev-Yao strand space model modulo an equational theory defining... -
Proactive visual cryptographic schemes for general access structures
In the modern digital era, long-term protection of digital data, stored in a server, is essential, especially when it is in the format of medical...
-
Towards the design of new cryptographic algorithm and performance evaluation measures
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Cryptographic Systems Technologies
Using the building blocks from the previous chapter, this chapter puts them together in two example systems. One of these, Transport Layer Security...