Sciweavers

2303 search results - page 12 / 461
» The Cryptographic Abstract Machine
Sort
View
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 1 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
EUROCRYPT
2000
Springer
13 years 11 months ago
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
Abstract. This paper addresses the problem of obtaining new construction methods for cryptographically significant Boolean functions. We show that for each positive integer m, ther...
Palash Sarkar, Subhamoy Maitra
ACSAC
2005
IEEE
14 years 1 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 1 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
FSE
2003
Springer
95views Cryptology» more  FSE 2003»
14 years 18 days ago
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Abstract. Helix is a high-speed stream cipher with a built-in MAC functionality. On a Pentium II CPU it is about twice as fast as Rijndael or Twofish, and comparable in speed to R...
Niels Ferguson, Doug Whiting, Bruce Schneier, John...