Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,794 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic protocol
Known as:
Cryptographic protocols
, Cyptographic protocol
, Secure connection
Expand
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alice and Bob
Authentication
Authentication protocol
Batch cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An improved version of the AAG cryptographic protocol
V. Roman’kov
Groups Complex. Cryptol.
2019
Corpus ID: 145977416
Abstract An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in…
Expand
Highly Cited
2017
Highly Cited
2017
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Jongho Won
,
Seung-Hyun Seo
,
E. Bertino
IEEE Access
2017
Corpus ID: 5477947
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication…
Expand
Review
2016
Review
2016
A Survey on Man in the Middle Attack
Kapil Jain
,
Manoj Jain
,
J. Borade
2016
Corpus ID: 215928681
The de-facto standards of the security protocol SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are used to create…
Expand
Review
2014
Review
2014
Foundations of Security Analysis and Design VII
A. Aldini
,
R. Gorrieri
Lecture Notes in Computer Science
2014
Corpus ID: 20566
With testing, a system is executed with a set of selected stimuli, and observed to determine whether its behavior conforms to the…
Expand
Highly Cited
2009
Highly Cited
2009
Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations
M. Pawłowski
2009
Corpus ID: 119078270
We show that monogamy of Bell's inequality violations, which is strictly weaker condition than the no-signaling principle is…
Expand
Highly Cited
2008
Highly Cited
2008
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
G. D. Meulenaer
,
F. Gosset
,
François-Xavier Standaert
,
Olivier Pereira
IEEE International Conference on Wireless and…
2008
Corpus ID: 8890563
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of…
Expand
Highly Cited
2007
Highly Cited
2007
Cryptography in the Multi-string Model
Jens Groth
,
R. Ostrovsky
Journal of Cryptology
2007
Corpus ID: 5219297
The common random string model introduced by Blum, Feldman, and Micali permits the construction of cryptographic protocols that…
Expand
Highly Cited
2005
Highly Cited
2005
A Three-Stage Quantum Cryptography Protocol
S. Kak
arXiv.org
2005
Corpus ID: 7245233
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret…
Expand
Review
2005
Review
2005
Encyclopedia of Cryptography and Security, 2nd Ed
H. V. Tilborg
2005
Corpus ID: 34221135
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most…
Expand
Highly Cited
2005
Highly Cited
2005
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
Z. Kfir
,
A. Wool
Security and Privacy in Communication Networks
2005
Corpus ID: 15723591
A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE