Search
Search Results
-
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Cryptographic Protocols
This chapter deals with cryptographic protocols. Each protocol is defined by a sequence of messages exchanged between two or more parties to achieve... -
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used...
-
The distance-bounding protocol based on Russian cryptographic algorithms
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a...
-
Security Verification of Instant Messaging Cryptographic Protocols
There is no doubt that nowadays, the use of smartphones for communication between two or more entities through instant messaging applications has... -
Cryptographic Competitions
Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...
-
Cryptographic protocol conformance testing based on domain-specific state machine
We present a method of conformance testing of the cryptographic protocol implementations that ensures a high degree of automation of the testing...
-
-
Optimization of ProVerif Programs for AKE Protocols
AbstractCryptographic protocols are used to establish secure connection between agents who communicate strictly in accordance with the rules...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Deep learning-based biometric cryptographic key generation with post-quantum security
In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on...
-
On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys
The paper systematically considers methods of changing the execution of known standard cryptographic primitives, symmetric and asymmetric, as well as...
-
RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
IoT has grown in popularity and acceptance as a result of its numerous uses across different industries. They gather information from the live...
-
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they...
-
The Asymmetric five-card trick: working with variable encoding in card-based protocols
Recently, card-based protocols have been extensively explored to illustrate relatively complex cryptographic concepts, such as Secure Multiparty...
-
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
This paper shows new card-based cryptographic protocols to compute Boolean functions using a standard deck of cards when the players are malicious.... -
A bivariate polynomial-based cryptographic hard problem and its applications
The problem of factoring a composite integer into the product of two distinct primes (the factoring problem) is one of the famous hard problems on...
-
The threat of forcing the identical roles for authenticated key establishment protocols
The paper considers the following situation: as a result of interaction under the authenticated key establishment protocol, the parties successfully...
-
Securing edge computing using cryptographic schemes: a review
The exponential growth and wide-area applications of the Internet of Things have garnered a lot of interest from academics and industries, thus...