Results 1 to 10 of about 23,312 (230)
Cryptographic primitives based on cellular transformations [PDF]
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj +4 more sources
Uncloneable Cryptographic Primitives with Interaction [PDF]
44 pages, 3 ...
Anne Broadbent, Eric Culf
openaire +3 more sources
The paper proposes a method for constructing primitive polynomials that are used in the design of radio engineering systems, subsystems of cryptographic information protection in reliable automated information processing and control systems at critical ...
Г.М. Гулак
exaly +3 more sources
Single-photon advantage in quantum cryptography beyond QKD [PDF]
Quantum key distribution (QKD) can be used to establish a secret key between trusted parties. Many practical use-cases in communication networks, however, involve parties who do not trust each other.
Daniel A. Vajner +10 more
doaj +2 more sources
Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Susil Petr, Vaudenay Serge
exaly +3 more sources
Algebraic Frameworks for Cryptographic Primitives
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
Navid Alamati
openaire +4 more sources
On the Use of GF-Inversion as a Cryptographic Primitive [PDF]
Inversion in Galois Fields is a famous primitive permutation for designing cryptographic algorithms e.g. for Rijndael because it has suitable differential and linear properties. Inputs and outputs are usually transformed by addition (e.g. XOR) to key bits. We call this construction the APA (Add-Permute-Add) scheme.
Kazumaro Aoki, Serge Vaudenay
exaly +2 more sources
Cryptographic Primitives that Resist Backdooring and Subversion
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
Sogol Mazaheri
openaire +4 more sources
On formal verification of arithmetic-based cryptographic primitives [PDF]
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao +11 more
core +2 more sources
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj +1 more source

