We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations

    This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article 15 June 2024
  2. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  3. Cryptographic Protocols

    This chapter deals with cryptographic protocols. Each protocol is defined by a sequence of messages exchanged between two or more parties to achieve...
    Jörg Schwenk in Guide to Internet Cryptography
    Chapter 2022
  4. Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

    This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article Open access 03 February 2022
  5. The distance-bounding protocol based on Russian cryptographic algorithms

    In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...

    Vladimir Belsky, Anastasiia Chichaeva, ... Kirill Tsaregorodtsev in Journal of Computer Virology and Hacking Techniques
    Article 17 May 2024
  6. Security Verification of Instant Messaging Cryptographic Protocols

    There is no doubt that nowadays, the use of smartphones for communication between two or more entities through instant messaging applications has...
    Gloria O. Olivares Ménez, Kevin A. Delgado Vargas, ... Gina Gallegos-García in Telematics and Computing
    Conference paper 2023
  7. Cryptographic Competitions

    Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...

    Daniel J. Bernstein in Journal of Cryptology
    Article Open access 08 December 2023
  8. Cryptographic protocol conformance testing based on domain-specific state machine

    We present a method of conformance testing of the cryptographic protocol implementations that ensures a high degree of automation of the testing...

    Article 03 April 2023
  9. Optimization of ProVerif Programs for AKE Protocols

    Abstract

    Cryptographic protocols are used to establish secure connection between agents who communicate strictly in accordance with the rules...

    E. M. Vinarskii, A. V. Demakov in Programming and Computer Software
    Article 21 December 2022
  10. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  11. Deep learning-based biometric cryptographic key generation with post-quantum security

    In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...

    Oleksandr Kuznetsov, Dmytro Zakharov, Emanuele Frontoni in Multimedia Tools and Applications
    Article 14 December 2023
  12. On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys

    The paper systematically considers methods of changing the execution of known standard cryptographic primitives, symmetric and asymmetric, as well as...

    Article 31 October 2021
  13. RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices

    IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...

    Shreyas Srinath, G. S. Nagaraja in SN Computer Science
    Article 28 June 2024
  14. A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...

    Siqi Lu, Jianhua Zheng, ... Chunxiang Gu in Science China Information Sciences
    Article 23 September 2022
  15. The Asymmetric five-card trick: working with variable encoding in card-based protocols

    Recently, card-based protocols have been extensively explored to illustrate relatively complex cryptographic concepts, such as Secure Multiparty...

    Article Open access 31 August 2023
  16. Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations

    This paper shows new card-based cryptographic protocols to compute Boolean functions using a standard deck of cards when the players are malicious....
    Tomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa in Information Security Practice and Experience
    Conference paper 2023
  17. A bivariate polynomial-based cryptographic hard problem and its applications

    The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...

    Bagher Bagherpour in Designs, Codes and Cryptography
    Article 29 April 2023
  18. The threat of forcing the identical roles for authenticated key establishment protocols

    The paper considers the following situation: as a result of interaction under the authenticated key establishment protocol, the parties successfully...

    Evgeny Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev in Journal of Computer Virology and Hacking Techniques
    Article 10 March 2023
  19. Securing edge computing using cryptographic schemes: a review

    The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in Multimedia Tools and Applications
    Article 27 September 2023
Did you find what you were looking for? Share feedback.