Algebraic models of asymmetric cryptographic systems

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Semantics for the Algebraic Models

MAFTIA’s Work-package 6 is pursuing the overall goal of “rigorously defining the basic concepts developed by MAFTIA, and verifying results of the work on dependable middle-ware.” In the former MAFTIA deliverable D4, we presented a general rigorous model for the security of reactive systems. This model comprised various types of faults (attacks) and topology as considered in MAFTIA, but was rest...

متن کامل

Process Algebraic Analysis of Cryptographic Protocols

Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the eld of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus { most notably Abadi and Gordon's spi-calculus { as protocol description languages. W...

متن کامل

ON ALGEBRAIC AND COALGEBRAIC CATEGORIES OF VARIETY-BASED TOPOLOGICAL SYSTEMS

Motivated by the recent study on categorical properties of latticevalued topology, the paper considers a generalization of the notion of topological system introduced by S. Vickers, providing an algebraic and a coalgebraic category of the new structures. As a result, the nature of the category   TopSys   of S. Vickers gets clari ed, and a metatheorem is stated, claiming that (latticevalu...

متن کامل

Algebraic Solving of Complex Interval Linear Systems by Limiting ‎Factors‎

In this work, we propose a simple method for obtaining the algebraic solution of a complex interval linear system where coefficient matrix is a complex matrix and the right-hand-side vector is a complex interval vector. We first use a complex interval version of the Doolittle decomposition method and then we restrict the Doolittle's solution, by complex limiting factors, to achieve a complex in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Information Security Research Journal

سال: 2014

ISSN: 2410-7840,2221-5212

DOI: 10.18372/2410-7840.16.6316