Sciweavers

659 search results - page 72 / 132
» Compiling and securing cryptographic protocols
Sort
View
126
Voted
APLAS
2010
ACM
15 years 23 days ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
111
Voted
FOCS
2010
IEEE
14 years 10 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ISCI
2008
104views more  ISCI 2008»
15 years 1 days ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
107
Voted
SAC
2004
ACM
15 years 6 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
96
Voted
IPSN
2007
Springer
15 years 6 months ago
MiniSec: a secure sensor network communication architecture
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protoco...
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. ...