Results 101 to 110 of about 388,006 (269)
High performance VLSI architectures implementing strong cryptographic primitives [PDF]
F. Allah Cherigui
openalex +1 more source
On the Use of GF-Inversion as a Cryptographic Primitive
Kazumaro Aoki, S. Vaudenay
semanticscholar +1 more source
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source
Constructions of advanced cryptographic primitives
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
openaire +1 more source
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
C. N. Mathur +2 more
semanticscholar +1 more source
A New Hard Problem for Post-Quantum Cryptography: Q-Problem Primitives [PDF]
Mostefa Kara +2 more
openalex +1 more source
Analysis of recent cryptographic primitives
In this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some ...
openaire +2 more sources
CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives [PDF]
Gregory J. E. Hill, Xavier Bellekens
openalex +1 more source

