全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

2. Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walk of a genuine single-photon entangled state NSTL国家科技图书文献中心

Panda, Dinesh Kumar |  Benjamin, Colin -  《Journal of physics,A.Mathematical and theoretical》 - 2025,58(1) - 共19页

摘要: proposed cryptographic protocol. This capability could |  SPES can be used as cryptographic keys to securely |  resilience of the 3-way and 2-way SPES-based cryptographic |  protocols against eavesdropper attacks like intercept-and |  experimental realization of these protocols using a single
关键词: quantum cryptography |  alternate quantum walk |  single-photon |  genuine entanglement

3. Toward a Universal Cryptographic Accelerator NSTL国家科技图书文献中心

Srinivas Devadas |  Daniel Sanchez -  《Computer》 - 2025,58(1) - 105~108 - 共4页

摘要: cryptography, followed by tailoring cryptographic protocols |  data can be guaranteed through cryptographic |  protocols. We address the computational burden posed by | Cyberphysical systems have disseminated |  devices that can be untrustworthy or compromised
关键词: Data privacy |  Cyber-physical systems |  Cryptography |  Hardware acceleration |  Cryptographic protocols

4. Cryptographic Cryptid Protocols How to Play Cryptid with Cheaters NSTL国家科技图书文献中心

Xavier Bultel |  Charlene Jojon... -  《Cryptology and Network Security,Part I》 -  International Conference on Cryptology and Network Security - 2025, - 26~48 - 共23页

摘要: a winner. We provide cryptographic protocols to |  our protocols in this model. We also analyze the |  practical efficiency of our protocols, based on an |  extend our protocols to ensure that the game designer | Cryptid is a board game in which the goal is
关键词: Provable security |  Board game |  Cryptid |  Zero knowledge proof

5. Communication lower bounds for cryptographic broadcast protocols NSTL国家科技图书文献中心

Erica Blum |  Elette Boyle... -  《Distributed computing》 - 2025,38(1) - 1~17 - 共17页

摘要:Broadcast protocols enable a set of n parties |  to deterministic protocols, or against strong |  to agree on the input of a designated sender, even |  facing attacks by malicious parties. In the honest | -majority setting, randomization and cryptography were
关键词: Broadcast |  Communication complexity |  Lower bounds

6. Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol NSTL国家科技图书文献中心

Enis Golaszewski |  Edward Zieglar... -  《Security Standardisation Research》 -  International Conference on Security Standardisation Research - 2025, - 81~119 - 共39页

摘要: the client's cryptographic assumptions but fails to |  bindings when augmenting legacy protocols. | We present the first formal-methods analysis |  of the Session Binding Proxy (SBP) protocol, which |  mitigates theft of a server-issued authentication cookie
关键词: Channel binding |  Cryptographic binding |  Cryptographic protocols |  Cryptographic protocol shapes analyzer (CPSA) |  Cryptography |  Cybersecurity |  Formal methods |  Oblivious protocol participants |  Session binding proxy (SBP) |  Transport layer security (TLS)...

7. Batch Array Codes NSTL国家科技图书文献中心

Xiangliang Kong |  Chen Wang... -  《IEEE Transactions on Information Theory》 - 2025,71(2) - 936~954 - 共19页

摘要: private information retrieval protocols. These codes | Batch codes are a type of codes specifically |  designed for coded distributed storage systems and |  have received much attention in recent years due to |  their ability to enable efficient and secure storage
关键词: Codes |  Symbols |  Information retrieval |  Switches |  Servers |  Graph theory |  Cryptographic protocols |  Vectors |  Throughput |  Tensors

8. Formal Verification of Forward Secrecy and Post-Compromise Security for TreeKEM NSTL国家科技图书文献中心

Alex J. Washburn |  Subash Shankar -  《Formal Methods》 -  Brazilian Symposium on Formal Methods - 2025, - 155~170 - 共16页

摘要:The TreeKEM protocol is the preeminent |  implementation candidate for the Message Layer Security |  standard. Prior work analyzed TreeKEM by defining the |  Continuous Group Key Agreement security game, which |  facilitated proof of some security guarantees and also
关键词: Cryptographic protocols |  Formal verification |  Linear temporal logic |  Model checking |  Promela |  Spin

9. Share the MAYO: Thresholdizing MAYO NSTL国家科技图书文献中心

Sofia Celi |  Daniel Escudero... -  《Post-Quantum Cryptography,Part I》 -  International Conference on Post-Quantum Cryptography - 2025, - 165~198 - 共34页

摘要: cryptographic protocols. | We present the first comprehensive study on |  thresholdizing practical OV-based signature schemes | , specifically focusing on MAYO and UOV. Our approach begins by |  addressing the challenges associated with thresholdizing
关键词: Post-quantum |  Threshold-cryptography

10. Efficient quantum algorithms to break group ring cryptosystems NSTL国家科技图书文献中心

Ann Dooms |  Carlo Emerencia -  《Journal of information security and applications》 - 2025,88(Feb.) - 103923.1~103923.5 - 共5页

摘要: cryptographic protocols like RSA, Diffie-Hellman key exchange |  enhance our current cryptographic tools for the post | The security of widely-used public-key |  and the Digital Signature Algorithm (DSA) is under |  threat due to the emergence of quantum computers
关键词: Public-key cryptography |  Post-quantum security |  Group ring cryptosystems
检索条件cryptographic protocols
  • 检索词扩展

NSTL主题词

  • NSTL学科导航