Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
The term cryptographic protocol is used in different ways.
This can be done with any of several well-understood cryptographic protocols.
Block ciphers can also be used in other cryptographic protocols.
A cryptographic protocol usually has at least some of these features:
There are many ways to attack it and its cryptographic protocols are not very good.
Cryptographic protocols protect the exchange of money between the smart card and the machine.
Cryptographic protocols can sometimes be verified formally on an abstract level.
A random function is a useful building block in enabling cryptographic protocols.
Such commitment schemes are commonly used in cryptographic protocols.
Cryptographic protocols are widely used for secure application-level data transport.
In some cases cryptographic protocols are found to have information theoretic security, the one-time pad is a common example.
It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.
Such cryptosystems are sometimes called cryptographic protocols.
When devising cryptographic protocols, one hopes to be able to prove security using the weakest possible assumptions.
Modern cryptographic protocols often require frequent generation of random quantities (see also nonce).
ProVerif is a software tool for automated reasoning about the security properties found in cryptographic protocols.
"In the crypto world, when you are explaining a cryptographic protocol, you use hypothetical people.
Sigma protocols, a type of cryptographic protocol.
Most cryptographic protocols rely on the prior establishment of secret or public keys or passwords.
A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics.
David L. Chaum is the inventor of many cryptographic protocols and ecash.
The XDH assumption is used in some pairing-based cryptographic protocols.
Strong secrecy is a term used in formal proof-based cryptography for making propositions about the security of cryptographic protocols.
His notable work includes several cryptanalytic attacks, and research in the practical use of cryptographic protocols, particularly in computer networks.
DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder.