Sciweavers

2303 search results - page 41 / 461
» The Cryptographic Abstract Machine
Sort
View
137
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
99
Voted
FC
2007
Springer
128views Cryptology» more  FC 2007»
15 years 8 months ago
On Authentication with HMAC and Non-random Properties
Abstract. MAC algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial appli
Christian Rechberger, Vincent Rijmen
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
15 years 7 months ago
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
a revised version of the extended abstract which appeared in The Cryptographers’ Track at RSA Conference ’2001 (8 – 12 april 2001, San Francisco, California, USA)
Tatsuaki Okamoto, David Pointcheval
JUCS
2008
144views more  JUCS 2008»
15 years 2 months ago
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Abstract: Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial
Christian Rechberger, Vincent Rijmen
141
Voted
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 29 days ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh