Skip to search formSkip to main contentSkip to account menu

Cryptographic protocol

Known as: Cryptographic protocols, Cyptographic protocol, Secure connection 
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive… 
Highly Cited
2001
Highly Cited
2001
  • R. Canetti
  • Proceedings IEEE International Conference on…
  • 2001
  • Corpus ID: 11439947
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient… 
Highly Cited
2001
Highly Cited
2001
  • B. Blanchet
  • Proceedings. 14th IEEE Computer Security…
  • 2001
  • Corpus ID: 3163713
Abstract: We present a new automatic cryptographic protocol verifier based on a simple representation of the protocol by Prolog… 
Highly Cited
2000
Highly Cited
2000
  • R. Canetti
  • Journal of Cryptology
  • 2000
  • Corpus ID: 13321608
Abstract. We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating… 
Review
1999
Review
1999
This paper, mostly expository in nature, surveys four measures of distinguishability for quantum-mechanical states. This is done… 
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is… 
Highly Cited
1997
Highly Cited
1997
We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We… 
Highly Cited
1997
Highly Cited
1997
A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… 
Highly Cited
1990
Highly Cited
1990
A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols. The… 
Highly Cited
1986
Highly Cited
1986
In this paper we demonstrate the generality and wide applicability of zero-knowledge proofs, a notion introduced by Goldwasser…