Sciweavers

1777 search results - page 17 / 356
» Programming Cryptographic Protocols
Sort
View
BIRTHDAY
2006
Springer
14 years 10 days ago
Cryptographic Protocol Verification Using Tractable Classes of Horn Clauses
We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifyin...
Helmut Seidl, Kumar Neeraj Verma
IEEEARES
2008
IEEE
14 years 3 months ago
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations of not considering protocols common in literature, which are in the form of comm...
Zhiyao Liang, Rakesh M. Verma
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 2 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher
MMMACNS
2001
Springer
14 years 1 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 2 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet