Cryptographic protocol
노트
- For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTPS) connections.[1]
 - Cryptographic protocols can sometimes be verified formally on an abstract level.[1]
 - The security of widely used cryptographic protocols is based on the conjectured difficulty of the factorization of large integers.[2]
 - Cryptographic protocols are widely used for secure application-level data transport, in order to secure transferred messages.[3]
 - The term cryptographic protocol is used in different ways.[3]
 - This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.[4]
 - A cryptographic protocol is designed to allow secure communication under a given set of circumstances.[5]
 - We apply reachability analysis over term rewriting systems to the verification of cryptographic protocols.[6]
 - Verification of copy-protection cryptographic protocol using approximations of term rewriting systems.[6]
 - Cryptographic protocols and algorithms are difficult to get right, so do not create your own.[7]
 - Quantum systems provide a level of security far exceeding that of any cryptographic protocol currently known, experts say.[8]
 - Designing new types of IoT-compatible cryptographic protocols has become a more popular way to secure IoT-based applications.[9]
 - Significant attention has been dedicated to the challenge of implementing a lightweight and secure cryptographic protocol for IoT devices.[9]
 - In this study, we propose a lightweight cryptographic protocol integrating certificateless signature and bilinear pairing crypto-primitives.[9]
 - Rigorous security analyses are conducted to guarantee the robustness of the proposed cryptographic protocol.[9]
 - At the heart of the security of any system using network interaction are cryptographic protocols.[10]
 - Thus, verification of the cryptographic protocol of the electronic voting system using source codes is relevant.[10]
 - A parser is described to extract the structure of the cryptographic protocol with which the structure of the voting protocol was obtained.[10]
 - In particular, TLS and IPsec are covered, as well as security protocols in WiFi networks.[11]
 - Designing a cryptographic protocol correctly is a hard task, and even cryptographic standard may be flawed.[12]
 - By nature, cryptographic protocols are at the heart of the products that make use of them.[12]
 - Are you building an innovative product that requires a secure cryptographic protocol but lack the required expertise?[12]
 - We can design the custom cryptographic protocol that best suits your requirements.[12]
 - This post discusses how to secure state-of-the-art cryptographic protocols against attacks from (future) quantum computers.[13]
 - Recognize the need for techniques for the verification and analysis of security protocols.[14]
 - People have found serious security flaws in major cryptographic protocols.[15]
 - In recent years, people use formal methods to guarantee the correctness of cryptographic protocols in a strong sense.[15]
 - In this paper, we propose to prove the correctness of cryptographic protocols based on the extension rule.[15]
 - We show that this is an effective technique, which can help to find the security flaws in major cryptographic protocols.[15]
 - TLS and IKE are some examples of well-known cryptographic protocols.[16]
 - CPSA attempts to enumerate all essentially different executions possible for a cryptographic protocol.[16]
 - Like GSM before it, LTE has a standard set of cryptographic protocols for encrypting packets while they travel over the air.[17]
 
소스
- ↑ 1.0 1.1 Cryptographic protocol
 - ↑ Cryptographic Protocol - an overview
 - ↑ 3.0 3.1 Simple English Wikipedia, the free encyclopedia
 - ↑ Introduction of Cryptographic Protocols
 - ↑ What is a “Cryptographic Protocol?”
 - ↑ 6.0 6.1 Cryptographic protocols
 - ↑ Cryptographic Algorithms and Protocols
 - ↑ Cryptographic protocol
 - ↑ 9.0 9.1 9.2 9.3 A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things
 - ↑ 10.0 10.1 10.2 Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries
 - ↑ Cryptographic protocols
 - ↑ 12.0 12.1 12.2 12.3 Cryptographic Protocols
 - ↑ Quantum Hardening Cryptographic Protocols
 - ↑ No title
 - ↑ 15.0 15.1 15.2 15.3 Cryptographic Protocol Verification Based on the Extension Rule
 - ↑ 16.0 16.1 mitre/cpsa: Cryptographic Protocol Shapes Analyzer
 - ↑ protocols – A Few Thoughts on Cryptographic Engineering