Using SMT solvers to automate design tasks for encryption and signature schemes

JA Akinyele, M Green, S Hohenberger - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
Cryptographic design tasks are primarily performed by hand today. Shifting more of this
burden to computers could make the design process faster, more accurate and less …

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

JA Akinyele, M Green, S Hohenberger… - Proceedings of the 2012 …, 2012 - dl.acm.org
As devices everywhere increasingly communicate with each other, many security
applications will require low-bandwidth signatures that can be processed quickly. Pairing …

Bringing zero-knowledge proofs of knowledge to practice

E Bangerter, S Barzan, S Krenn, AR Sadeghi… - Security Protocols XVII …, 2013 - Springer
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many
practical cryptographic applications such as identification schemes, group signatures, and …

Automatic generation of sound zero-knowledge protocols

E Bangerter, J Camenisch, S Krenn… - Cryptology ePrint …, 2008 - eprint.iacr.org
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many
practical cryptographic applications such as identification schemes, group signatures, and …

Automatic generation of sigma-protocols

E Bangerter, T Briner, W Henecka, S Krenn… - European Public Key …, 2009 - Springer
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many
cryptographic applications such as identification schemes, group signatures, and secure …

[PDF][PDF] An efficient authentication protocol based on elliptic curve cryptography for mobile networks

PG Rajeswari, K Thilagavathi - IJCSNS, 2009 - idc-online.com
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically,
mobile networks are deployed in un-trusted environments. Such networks in this day and …

System and method for obfuscating data using instructions as a source of pseudorandom values

J McLachlan, GM Myles, J Lerouge - US Patent 9,116,765, 2015 - Google Patents
Disclosed herein are systems, methods, and non-transitory computer-readable storage
media for obfuscating data using instructions as a source of pseudorandom values …

A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields

KH Kim - Cryptology ePrint Archive, 2007 - eprint.iacr.org
Recently, the supersingular elliptic curves over ternary fields are widely used in pairing
based crypto-applications since they achieve the best possible ratio between security level …

[PDF][PDF] Enabling Machine-Aided Cryptographic Design

J Akinyele - 2013 - jscholarship.library.jhu.edu
The design of cryptographic primitives such as digital signatures and public-key encryption
is very often a manual process conducted by expert cryptographers. This persists despite the …

System and method for data obfuscation based on discrete logarithm properties

AJ Farrugia, B Chevallier-Mames, M Ciet… - US Patent …, 2013 - Google Patents
Disclosed herein are systems, computer-implemented meth ods, and computer-readable
storage media for obfuscating databased on a discrete logarithm. A system practicing the …