The NRL protocol analyzer: An overview

C Meadows - The Journal of Logic Programming, 1996 - Elsevier
The NRL Protocol Analyzer is a prototype special-purpose verification tool, written in Prolog,
that has been developed for the analysis of cryptographic protocols that are used to …

Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

[HTML][HTML] The transport layer security (TLS) protocol version 1.3

E Rescorla - 2018 - rfc-editor.org
RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3 [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata Exist Internet Engineering …

Tendermint: Byzantine fault tolerance in the age of blockchains

E Buchman - 2016 - atrium.lib.uoguelph.ca
Tendermint is a new protocol for ordering events in a distributed network under adversarial
conditions. More commonly known as consensus or atomic broadcast, the problem has …

Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

Practical attacks against privacy and availability in 4G/LTE mobile communication systems

A Shaik, R Borgaonkar, N Asokan, V Niemi… - arXiv preprint arXiv …, 2015 - arxiv.org
Mobile communication systems now constitute an essential part of life throughout the world.
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …