نتایج جستجو برای: cryptographic protocols

تعداد نتایج: 116404  

1993
Alec F. Yasinsac William A. Wulf

Cryptographic Protocol (CP) analysis is a topic of intense research. Meadows describes four approaches for CP verification under investigation in [MEA92] and several authors have categorized protocols based on types of errors they are subject to [BIRD92], [SYV93a],[SYV93b]. This paper addresses the weakness injected into protocols when information is passed in the clear or encrypted only under ...

2006
Alexander Klink Evangelos Karatsiolis

Acknowledgements I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant motivation. • Roberto Samarone Araujo for hours of discussing various protocols w...

Journal: :Electronic Notes in Theoretical Computer Science 2007

Journal: :Journal of Cryptology 2021

An important benchmark for multi-party computation protocols (MPC) is their round complexity. For several MPC tasks, such as broadcast, (tight) lower bounds on the complexity are known. However, some of these can be circumvented when termination every party not a priori known, and simultaneous guaranteed. Protocols with this property called probabilistic-termination (PT) protocols. Running PT i...

Journal: :IEEE Security & Privacy 2022

Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how can formalize protocols, adversary models, properties, scale to substantial, real world, verification problems.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید