Sciweavers

1019 search results - page 27 / 204
» Cryptographic Design Vulnerabilities
Sort
View
IFIP
2009
Springer
15 years 4 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
FCCM
1998
IEEE
99views VLSI» more  FCCM 1998»
15 years 1 months ago
FPGA-Based Architecture Evaluation of Cryptographic Coprocessors for Smartcards
In 1996, about 600 million IC-cards were manufactured worldwide. Due to very small die sizes (max. 25 mm2 ) smartcards encounter more severe restrictions than conventional coproces...
Hagen Ploog, Dirk Timmermann
DBSEC
2007
80views Database» more  DBSEC 2007»
14 years 11 months ago
A Scalable and Secure Cryptographic Service
In this paper we present the design of a scalable and secure cryptographic service that can be adopted to support large-scale networked systems, which may require strong authentica...
Shouhuai Xu, Ravi S. Sandhu
ACSAC
1999
IEEE
15 years 1 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
IANDC
2007
151views more  IANDC 2007»
14 years 9 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke