6 Hits in 5.3 sec

Logical concepts in cryptography

Simon Kramer
2007 ACM SIGACT News  
D'une part,à la sécurité de la communication (par oppositionà la sécurité du stockage) de données, et d'autre part, aux protocoles cryptographiques (par opposition aux opérateurs cryptographiques).  ...  In the light of logic, adding PP to a formalism for cryptographic protocols is perhaps also simple and can be achieved with an Ockham's razor extension of an existing core logic, namely CPL.  ...  discussions about crypto logics and his constructive criticism of my work; Marc De Falco for his exploratory (now superseded) contribution to my work at an experimental stage; Christoph Frei for his elder-brotherly  ... 
doi:10.1145/1345189.1345205 fatcat:wyk6rfbagbfwrasry7ohjjbq5q

A Formal Theory of Key Conjuring

Veronique Cortier, Stephanie Delaune, Graham Steel
2007 Computer Security Foundations Workshop (CSFW), Proceedings of the IEEE  
We describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys.  ...  We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM's Common Cryptographic Architecture (CCA).  ...  is constructed, with rules describing the operations of the intruder and protocol.  ... 
doi:10.1109/csf.2007.5 dblp:conf/csfw/CortierDS07 fatcat:ymsgix7kdbbo5mkovodrm5tuke

Interférences quantiques : études et applications

Damien Stucki, Nicolas Gisin
We tested the stability under field conditions using aerial and terrestrial cables and performed a key exchange over 67 km between Geneva and Lausanne.  ...  We present a fibre-optical quantum key distribution system. It works at 1550 nm and is based on the plug&play set-up.  ...  Acknowledgments We would like to thank Michel Peris and Christian Durussel from Swisscom for giving us access to their fibre links, as well as Laurent Guinnard and Mario Pasquali for their help with the  ... 
doi:10.13097/archive-ouverte/unige:2244 fatcat:szakvuw72vegzi375vpgw6ilme

Contribution à la conception de systèmes numériques adaptatifs

Pascal Benoit, Pascal
cryptographic applications.  ...  Due to their construction, they also offer full compatibility with most existing software and technological countermeasures to achieve a higher level of security.  ...  in the security and cryptographic applications and non-volatile computing based on emerging technologies.  ... 

Security and Privacy in RFID Systems

Khaled Ouafi
is PhD thesis is concerned with authentication protocols using portable lightweight devices such as RFID tags. ese devices have lately gained a signi cant attention for the diversity of the applications  ...  We take a cryptographic viewpoint on the issue and study the extent of security and privacy that RFID-based solutions can offer. v vi       e rest of the dissertation is  ...  We also argued that protocols proven private in the UC-based model of Le, Burmester and de Meideros, are still vulnerable to privacy attacks that have a practical sense.  ... 
doi:10.5075/epfl-thesis-5283 fatcat:sieghhxnfzd2vmpsamhzpz57da

Practical and fundamental issues on quantum correlations

Cyril Branciard, Nicolas Gisin
The prospects of new developments and of new applications encourage physicists to search for a deeper understanding of these correlations, and of their non-locality.  ...  We also consider n-partite correlations, and propose a new approach to quantify their multi-partite non-locality, by comparing them to correlations obtained with classical communication models.  ...  This work was supported by the Swiss NCCR Quantum Photonics and by the EU Integrated Project Qubit Applications. We thank M.J. Collett, F. De Martini, S. Gonzalez-Andino and A.  ... 
doi:10.13097/archive-ouverte/unige:4041 fatcat:67aiaxnoqbfqhmapaqemff3un4