Sciweavers

1777 search results - page 33 / 356
» Programming Cryptographic Protocols
Sort
View
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
PKC
2010
Springer
130views Cryptology» more  PKC 2010»
15 years 5 months ago
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Abstract. This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of F× q6 , for q ≡ 1 mod 6. This result arises from consideri...
Robert Granger, Michael Scott
ESORICS
2007
Springer
15 years 7 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
TARK
2007
Springer
15 years 7 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
16 years 1 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner