Search results
Jump to navigation
Jump to search
- ...2.2013.766827|s2cid=6744219|issn=0092-7872}}</ref> In many cases, tropical cryptographic schemes have arisen from adapting classical (non-tropical) schemes to inste ...2 KB (230 words) - 01:41, 2 July 2024
- * <math>N_A</math> and <math>N_B</math> are [[cryptographic nonce|nonces]] generated by A and B respectively ...iang | last5=Chen | title=Two attacks on Neuman-Stubblebine authentication protocols | place=Tainan, Taiwan | year=1994 | doi = 10.1016/0020-0190(95)00177-E | j ...4 KB (629 words) - 04:08, 6 May 2023
- ...s, and [[matrix group]]s have been identified as potential candidates for cryptographic applications. In contrast to non-commutative cryptography, the currently wi ...[[authentication]]. These protocols are very similar to the corresponding protocols in the commutative case. ...12 KB (1,946 words) - 01:33, 29 June 2024
- ...been described as being inefficient compared to alternative authentication protocols.<ref name="stallings">{{cite book|last=Stallings|first=William|title=Crypto :<math>N_x</math> - [[Cryptographic nonce|nonce]] chosen by <math>x</math>. ...3 KB (514 words) - 23:51, 30 September 2023
- * <math>N_A</math> and <math>N_B</math> are [[cryptographic nonce|nonces]] generated by A and B respectively [[Category:Cryptographic protocols]] ...4 KB (580 words) - 16:57, 2 June 2022
- {{short description|Cryptographic protocol designed to resist quantum computer attacks}} [[Category:Cryptographic protocols]] ...4 KB (523 words) - 19:18, 13 February 2025
- {{short description|Proposed cryptographic primitive}} In [[cryptography]], '''black-box obfuscation''' was a proposed [[cryptographic primitive]] which would allow a [[computer program]] to be [[obfuscation (s ...7 KB (1,015 words) - 15:58, 14 October 2024
- ...rcome the shortcoming of [[Client Puzzle Protocol|computation-based puzzle protocols]], in which [[Client (computing)|clients]] are required to compute hard CPU ...</math>, <math>ts</math> is a coarse timestamp, and <math>hash</math> is a cryptographic hash function such as [[SHA-1]]. ...10 KB (1,646 words) - 22:41, 18 January 2024
- ...d encryption]], and [[broadcast encryption]]. There exist constructions of cryptographic 2-multilinear maps, known as bilinear maps,<ref name="pairingSurvey" /> how title=Pairing-Based Cryptographic Protocols : A Survey|journal=e-Print IACR| ...7 KB (1,053 words) - 19:57, 10 December 2024
- ...|TLS]] etc. The authentication is based on public key pairs. As with other protocols, YAK normally requires a [[Public Key Infrastructure]] to distribute authen ...erial <math>K</math>, Alice and Bob can derive a [[session key]] using a [[cryptographic hash function]]: <math>\kappa = H(K)</math>. ...6 KB (893 words) - 21:17, 10 February 2025
- ...id=18643410|bibcode=2008PhRvL.100v0502W|s2cid=2974264}}</ref> refers to a cryptographic model employed in [[quantum cryptography]]. It assumes that the quantum mem ...ain goal of this model is to enable the secure implementation of two-party cryptographic primitives, such as [[bit commitment]], [[oblivious transfer]] and [[Smart ...22 KB (3,003 words) - 01:14, 25 December 2024
- ...shel, and [[Dorian M. Goldfeld|Dorian Goldfeld]]. Unlike other group-based protocols, it does not employ any commuting or commutative subgroups of a given platf [[Category:Cryptographic protocols]] ...5 KB (776 words) - 21:47, 21 March 2023
- ...hy is a sub-field of relativistic cryptography, in which [[cryptographic]] protocols exploit the no-superluminal signalling principle, independently of whether ..."/><ref name="practicalrelcomm"/><ref name="AdlamKent15DIRQBC"/> and other cryptographic tasks have been investigated in the setting of relativistic quantum cryptog ...25 KB (3,199 words) - 11:31, 12 December 2023
- ...istribution processes are not considered as part of the definition of this cryptographic scheme. .... |author-link1=Steven Murdoch |date=March 2016 |title=Insecure by Design: Protocols for Encrypted Phone Calls |journal=Computer |publisher=IEEE |volume=49 |iss ...10 KB (1,576 words) - 07:26, 31 July 2024
- ...tive secret sharing''' is an underlying technique in '''Proactive Security Protocols.''' ...12600.112605]</ref> The method has been used in the areas of cryptographic protocols in [[secure multi-party computation]] and in [[threshold cryptosystem]]s. ...9 KB (1,406 words) - 10:35, 25 February 2025
- A '''quantum money''' scheme is a [[Quantum Cryptography|quantum cryptographic]] protocol that creates and verifies banknotes that are resistant to [[Forg .../ref> and later influenced the development of [[quantum key distribution]] protocols used in [[quantum cryptography]]. ...4 KB (560 words) - 00:49, 21 March 2024
- ...pping|coin tossing]], which were also the first relativistic cryptographic protocols.<ref name="Kent99commitment"/><ref name="Kent99cointossing"/> He is a co-in ...<ref name="Kent99commitment"/><ref name="Kent99cointossing"/> relativistic protocols that evade no-go theorem by Mayers, Lo and Chau, and by Lo and Chau, respec ...14 KB (1,607 words) - 06:33, 4 April 2024
- {{Short description|Cryptographic technique}} ...ip |title=Random Oracles are Practical: A Paradigm for Designing Efficient Protocols |date=1995 |pages=62–73 |publisher=ACM Press|citeseerx=10.1.1.50.3345 }}</r ...8 KB (1,179 words) - 10:35, 16 February 2025
- ...or-secure-computations>{{cite conference |last=Yao |first=Andrew C. |title=Protocols for secure computations |book-title=23rd Annual Symposium on Foundations of ==Protocols and proof== ...10 KB (1,686 words) - 04:20, 22 January 2024
- ...by Juggling]. ''Proceedings of the 16th International Workshop on Security Protocols, 2008.''</ref> This protocol allows two parties to establish private and au ...erial <math>K</math>, Alice and Bob can derive a [[session key]] using a [[Cryptographic hash function]]: <math>\kappa = H(K)</math>. ...10 KB (1,480 words) - 21:37, 26 February 2025