Results 1 to 10 of about 22,025 (211)

On the Design of Cryptographic Primitives [PDF]

open access: greenActa Applicandae Mathematicae, 2006
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design. In order to achieve such a double goal, a tour through the descriptions of the two main cryptographic ...
Pino Caballero‐Gil   +1 more
core   +7 more sources

A cryptographic primitive based on hidden-order groups [PDF]

open access: hybridJournal of Mathematical Cryptology, 2009
Let G1 be a cyclic multiplicative group of order n. It is known that the computational Diffie–Hellman (CDH) problem is random self-reducible in G1 if φ(n) is known.
Saxena Amitabh, Soh Ben
doaj   +4 more sources

Cryptographic primitives in blockchains

open access: hybridJournal of Network and Computer Applications, 2018
Abstract Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently. Although many surveys have recently been dedicated to the security and privacy issues of blockchains, there still lacks a systematic examination on the cryptographic primitives in blockchains.
Licheng Wang   +4 more
openalex   +3 more sources

A language-dependent cryptographic primitive [PDF]

open access: bronzeJournal of Cryptology, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
openalex   +4 more sources

Post-Quantum Cryptographic Hardware Primitives

open access: green, 2019
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security ...
Lake Bu   +3 more
openalex   +4 more sources

The Black-Box Model for Cryptographic Primitives [PDF]

open access: bronzeJournal of Cryptology, 1998
To investigate security properties of a cryptographic primitive it is useful to grasp the idea a class of attacks is based on. Having a model that describes essential features of the primitive without unnecessary details one can concentrate on what makes the primitive resistant to what class of attacks.
C. P. Schnorr, Serge Vaudenay
openalex   +4 more sources

Constructions of Advanced Cryptographic Primitives

open access: bronze, 2023
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
Michael Reichle
openalex   +4 more sources

Verification of a Cryptographic Primitive [PDF]

open access: bronzeACM Transactions on Programming Languages and Systems, 2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
Andrew W. Appel
openalex   +3 more sources

Cryptographic primitives based on cellular transformations [PDF]

open access: yesComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Home - About - Disclaimer - Privacy