Results 1 to 10 of about 23,312 (230)

Cryptographic primitives based on cellular transformations [PDF]

open access: greenComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj   +4 more sources

Method for Constructing Primitive Polynomials for Cryptographic Subsystems of Dependable Automated Systems

open access: yesJournal of Automation and Information Sciences, 2020
The paper proposes a method for constructing primitive polynomials that are used in the design of radio engineering systems, subsystems of cryptographic information protection in reliable automated information processing and control systems at critical ...
Г.М. Гулак
exaly   +3 more sources

Single-photon advantage in quantum cryptography beyond QKD [PDF]

open access: yesNature Communications
Quantum key distribution (QKD) can be used to establish a secret key between trusted parties. Many practical use-cases in communication networks, however, involve parties who do not trust each other.
Daniel A. Vajner   +10 more
doaj   +2 more sources

Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]

open access: yesLecture Notes in Computer Science, 2013
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Susil Petr, Vaudenay Serge
exaly   +3 more sources

Algebraic Frameworks for Cryptographic Primitives

open access: green, 2020
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
Navid Alamati
openaire   +4 more sources

On the Use of GF-Inversion as a Cryptographic Primitive [PDF]

open access: yesLecture Notes in Computer Science, 2004
Inversion in Galois Fields is a famous primitive permutation for designing cryptographic algorithms e.g. for Rijndael because it has suitable differential and linear properties. Inputs and outputs are usually transformed by addition (e.g. XOR) to key bits. We call this construction the APA (Add-Permute-Add) scheme.
Kazumaro Aoki, Serge Vaudenay
exaly   +2 more sources

Cryptographic Primitives that Resist Backdooring and Subversion

open access: green, 2020
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
Sogol Mazaheri
openaire   +4 more sources

On formal verification of arithmetic-based cryptographic primitives [PDF]

open access: yes, 2009
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao   +11 more
core   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Home - About - Disclaimer - Privacy