Results 1 to 10 of about 362,814 (211)
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System
Substitution permutation network (SP-network) is a chain of linked mathematical primitives used in block cipher algorithms. The proposed novel design of cryptographic SP-network consists of three cryptographic primitives: substitution box, permutation ...
Muhammad Fahad Khan +3 more
doaj +2 more sources
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
Stéphane Badel +7 more
openalex +3 more sources
On Central Primitives for Quantum Cryptography with Classical Communication [PDF]
Recent work has introduced the"Quantum-Computation Classical-Communication"(QCCC) (Chung et. al.) setting for cryptography. There has been some evidence that One Way Puzzles (OWPuzz) are the natural central cryptographic primitive for this setting ...
Kai-Min Chung, Eli Goldin, Matthew Gray
openalex +2 more sources
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj +1 more source
Linear Complexity of Hidden Weighted Bit Functions [PDF]
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj +1 more source
Hash Algorithm In Verification Of Certificate Data Integrity And Security
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar +2 more
doaj +1 more source
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh +3 more
doaj +1 more source
Experimental cheat-sensitive quantum weak coin flipping
Quantum-enhanced versions of weak coin flipping (a cryptographic primitive where two mistrustful parties agree on a random bit while favouring opposite outcomes) have been proposed in the past but never realised.
Simon Neves +5 more
doaj +1 more source
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj +1 more source
A new method for solving the elliptic curve discrete logarithm problem [PDF]
The elliptic curve discrete logarithm problem is considered a secure cryptographic primitive. The purpose of this paper is to propose a paradigm shift in attacking the elliptic curve discrete logarithm problem.
Ansari Abdullah +2 more
doaj +1 more source

