Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cryptographic protocol

Known as: Cryptographic protocols, Cyptographic protocol, Secure connection 
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Blockchain technology, while still challenged with key limitations, is a transformative Information and Communications Technology… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2001
Highly Cited
2001
  • R. Canetti
  • Proceedings IEEE International Conference on…
  • 2001
  • Corpus ID: 11439947
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2001
Highly Cited
2001
  • B. Blanchet
  • Proceedings. 14th IEEE Computer Security…
  • 2001
  • Corpus ID: 3163713
Abstract: We present a new automatic cryptographic protocol verifier based on a simple representation of the protocol by Prolog… Expand
  • figure 1
  • figure 2
  • figure 5
Highly Cited
2000
Highly Cited
2000
  • R. Canetti
  • Journal of Cryptology
  • 2000
  • Corpus ID: 13321608
Abstract. We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating… Expand
Highly Cited
1999
Highly Cited
1999
We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We… Expand
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is… Expand
  • figure 4
Highly Cited
1997
Highly Cited
1997
We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand
Highly Cited
1993
Highly Cited
1993
CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric… Expand
Highly Cited
1990
Highly Cited
1990
A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols. The… Expand