Sciweavers

199 search results - page 9 / 40
» A survey of algebraic properties used in cryptographic proto...
Sort
View
IPL
2010
93views more  IPL 2010»
14 years 8 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch
CSFW
2000
IEEE
15 years 2 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
WISTP
2009
Springer
15 years 4 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
SETA
2010
Springer
137views Mathematics» more  SETA 2010»
14 years 8 months ago
On a Conjecture about Binary Strings Distribution
It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant d...
Jean-Pierre Flori, Hugues Randriam, Gérard ...
ESORICS
2009
Springer
15 years 10 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel