The NRL protocol analyzer: An overview
C Meadows - The Journal of Logic Programming, 1996 - Elsevier
The NRL Protocol Analyzer is a prototype special-purpose verification tool, written in Prolog,
that has been developed for the analysis of cryptographic protocols that are used to …
that has been developed for the analysis of cryptographic protocols that are used to …
Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
[HTML][HTML] The transport layer security (TLS) protocol version 1.3
E Rescorla - 2018 - rfc-editor.org
RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3 [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist Internet Engineering …
[Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist Internet Engineering …
Tendermint: Byzantine fault tolerance in the age of blockchains
E Buchman - 2016 - atrium.lib.uoguelph.ca
Tendermint is a new protocol for ordering events in a distributed network under adversarial
conditions. More commonly known as consensus or atomic broadcast, the problem has …
conditions. More commonly known as consensus or atomic broadcast, the problem has …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
Practical attacks against privacy and availability in 4G/LTE mobile communication systems
Mobile communication systems now constitute an essential part of life throughout the world.
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
Elliptic curve cryptography
D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …
[图书][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …