Sciweavers

1777 search results - page 33 / 356
» Programming Cryptographic Protocols
Sort
View
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
PKC
2010
Springer
130views Cryptology» more  PKC 2010»
14 years 17 days ago
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Abstract. This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of F× q6 , for q ≡ 1 mod 6. This result arises from consideri...
Robert Granger, Michael Scott
ESORICS
2007
Springer
14 years 2 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
TARK
2007
Springer
14 years 2 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 9 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner