Abstract. Previously, the author has developed a framework within which to quantify and compare the resources consumed during computational—especially unconventional computational—processes (adding to the familiar resources of run-time and memory space such non-standard resources as precision and energy); it is natural and beneficial in this framework to employ various complexity-theoretic tools and techniques. Here, we seek an analogous treat-ment not of computational processes but of cryptographic protocols and similar, so as to be able to apply the existing arsenal of complexity-theoretic methods in new ways, in the derivation and verification of protocols in a wider, crypto-graphic context. Accordingly, we advocate a framework in which ...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
In this tutorial, selected topics of cryptology and of computational complexity theory are presented...
Availability has become a primary goal of information security and is as significant as other goals,...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
Attacks on cryptographic systems are limited by the available computational resources. A theoretical...
In an emerging computing paradigm, computational capabilities, from processing power to storage capa...
There are two principal notions of security for cryptographic systems. For a few systems, they can b...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot p...
There has been a common perception that computational complexity is a theory of "bad news" because i...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
In this tutorial, selected topics of cryptology and of computational complexity theory are presented...
Availability has become a primary goal of information security and is as significant as other goals,...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
Attacks on cryptographic systems are limited by the available computational resources. A theoretical...
In an emerging computing paradigm, computational capabilities, from processing power to storage capa...
There are two principal notions of security for cryptographic systems. For a few systems, they can b...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot p...
There has been a common perception that computational complexity is a theory of "bad news" because i...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a c...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...