Results 91 to 100 of about 1,355 (213)
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers [PDF]
Sajjad Shaukat Jamal +3 more
openalex +1 more source
Privacy-oriented cryptographic primitives and protocols for electronic voting
Παναγιώτης Γροντάς
openalex +1 more source
A new semiring and its cryptographic applications
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang +3 more
doaj +1 more source
87th Annual Meeting of the Meteoritical Society 2025: Abstracts
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley +1 more source
On Formal Verification of Arithmetic-Based Cryptographic Primitives [PDF]
David Nowak, David Nowak
openalex +1 more source
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source
Constructions of advanced cryptographic primitives
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
openaire +1 more source
Analysis of recent cryptographic primitives
In this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some ...
openaire +2 more sources
CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives
Anonymous
openalex +1 more source
Cryptographic Primitives with Quasigroup Transformations
AMS Subj. Classification: Primary 20N05, Secondary 94A60 The intention of this research is to justify deployment of quasigroups in cryptography, especially with new quasigroup based cryptographic hash function NaSHA as a runner in the First round of the ongoing NIST SHA-3 competition.
openaire +4 more sources

