نتایج جستجو برای: cryptographic protocols

تعداد نتایج: 116404  

Journal: :IACR Cryptology ePrint Archive 2004
Ratna Dutta Rana Barua Palash Sarkar

The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves have recently been found applications in design of cryptographic protocols. In this survey, we have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models.

2005
Chris Karlof Naveen Sastry David A. Wagner

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and we must analyze their security by considering the system in its entirety. In this paper, we analy...

2007
Adel Bouhoula Florent Jacquemard

We present a new method for automatic implicit induction theorem proving, and its application for the verification of cryptographic protocols. The method is based on constrained tree grammars and handles non-confluent rewrite systems which are required in the context of the verification of security protocols because of the non-deterministic behavior of attackers. It also handles axioms between ...

2000
Catherine Meadows

Denial of service is becoming a growing concern. As computer systems communicate more and more with others that they know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up resources and disable servers. This paper shows how some principles that have alr...

Journal: :Trans. Petri Nets and Other Models of Concurrency 2012
Suriadi Suriadi Chun Ouyang Ernest Foo

To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the tr...

2010
Michael Backes Matteo Maffei Esfandiar Mohammadi

While Dolev-Yao models traditionally comprise only noninteractive cryptographic operations (i.e., cryptographic operations that produce a single message and do not involve any form of communication, such as encryption and digital signatures), recent cryptographic protocols rely on more sophisticated interactive primitives (i.e., cryptographic operations that involve several message exchanges am...

Journal: :IACR Cryptology ePrint Archive 2003
Michael Backes Birgit Pfitzmann Michael Waidner

Bridging the gap between formal methods and cryptography has recently received a lot of interest, i.e., investigating to what extent proofs of cryptographic protocols made with abstracted cryptographic operations are valid for real implementations. However, a major goal has not been achieved yet: a soundness proof for an abstract crypto-library as needed for the cryptographic protocols typicall...

Journal: :IJWMC 2007
Jason Smith Suratose Tritilanunt Colin Boyd Juan Manuel González Nieto Ernest Foo

Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be...

Journal: :IACR Cryptology ePrint Archive 2013
Ta Vinh Thong Amit Dvir

In this paper, we address the problem of formal and automated security verification ofWSN transport protocols that may perform cryptographic operations. The verification ofthis class of protocols is difficult because they typically consist of complex behavioral charac-teristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem,we propose a pr...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Matteo Maffei

Formal methods have been proved successful in analyzing different kinds of security protocols. They typically formalize and study the security guarantees provided by cryptographic protocols, when executed by a (possibly unbounded) number of different participants. A key problem in applying formal methods to cryptographic protocols, is the study of multi-protocol systems, where different protoco...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید