Cryptographic protocols

Results: 3642



#Item
281Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

PDF Document

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:38
282Cryptography / Public-key cryptography / Ciphertext indistinguishability / Cryptographic protocols / Cryptographic software / Chosen-ciphertext attack / RSA / Key exchange / Advantage / CryptoVerif / Semantic security / Strong secrecy

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-16 06:52:57
283Cryptographic protocols / Internet Standards / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / GnuTLS / OpenSSL / Cipher suite / Electronic authentication / Online Certificate Status Protocol / X.509

PDF Document

Add to Reading List

Source URL: gnutls.org

Language: English - Date: 2016-02-03 03:28:21
284Secure communication / Internet protocols / Cryptographic protocols / Transport Layer Security / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK / TLS-SRP / GnuTLS / Cipher suite

PDF Document

Add to Reading List

Source URL: bh.ht.vc

Language: English - Date: 2014-07-18 09:42:13
285Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
286Cryptography / Public-key cryptography / Protocol composition logic / Automated theorem proving / Cryptographic protocols / Substitution / Digital signature / Communications protocol / Transport Layer Security

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:12
287

Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols ? Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-08-24 12:32:41
    288Oblivious transfer / Secure multi-party computation / Information-theoretic security / Secret sharing / Distributed computing / Indocrypt / Commitment scheme / Asynchronous system / Cryptography / Cryptographic protocols / Verifiable secret sharing

    Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

    Add to Reading List

    Source URL: www.cs.bris.ac.uk

    Language: English - Date: 2012-09-07 07:03:05
    289Email / Cryptographic protocols / Internet protocols / Protocols / Internet standards / IPsec / Cell Broadcast / Transmission Control Protocol / European Telecommunications Standards Institute / Computing / Data / Information

    TSV1Satellite Earth Stations and Systems (SES); Satellite Emergency Communications; Multiple Alert Message Encapsulation over Satellite (MAMES)

    Add to Reading List

    Source URL: www.etsi.org

    Language: English - Date: 2015-05-12 09:42:04
    290Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

    Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-04 05:09:56
    UPDATE