Modelling and verification of post-quantum key encapsulation mechanisms using Maude
Communication and information technologies shape the world's systems of today, and those
systems shape our society. The security of those systems relies on mathematical problems …
systems shape our society. The security of those systems relies on mathematical problems …
Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version
This article presents a security formal analysis of the hybrid post-quantum Transport Layer
Security (TLS) protocol, a quantum-resistant version of the TLS protocol proposed by …
Security (TLS) protocol, a quantum-resistant version of the TLS protocol proposed by …
Formalization and analysis of the post-quantum signature scheme FALCON with Maude
Digital signatures ensure the authenticity and integrity of digital assets, vital properties for
any secure communication. The National Institute of Standards and Technologies launched …
any secure communication. The National Institute of Standards and Technologies launched …
Analysis and verification of code-based key encapsulation mechanism BIKE in Maude
V García, S Escobar - 2023 JNIC Cybersecurity Conference …, 2023 - ieeexplore.ieee.org
Information technologies are everywhere. From mobile devices to the simplest components,
all of them share information over the network. This network might prove to be insecure in …
all of them share information over the network. This network might prove to be insecure in …
[PDF][PDF] Formal specification of the post-quantum signature scheme FALCON in Maude
Cryptography is an important piece in any communication system. Digital signatures are a
part of cryptography that ensures the authenticity and integrity of digital assets, vital …
part of cryptography that ensures the authenticity and integrity of digital assets, vital …