Results 111 to 120 of about 21,314 (180)

On Formal Verification of Arithmetic-Based Cryptographic Primitives [PDF]

open access: yes, 2009
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems. In many cases, their security proofs consist in showing that they are reducible to computationally hard problems. Those reductions can be subtle and tedious, and thus not easily checkable.
openaire   +3 more sources

On the cryptographic properties of “Limonnik-3” AKE scheme

open access: yesБезопасность информационных технологий, 2019
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj   +1 more source

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives (full version)

open access: green, 2022
Joel Kuepper   +11 more
openalex   +2 more sources

The least primitive roots mod p

open access: yesJournal of Mathematical Cryptology
Let p>1p\gt 1 be a large prime number, and let ε>0\varepsilon \gt 0 be a small number. The established unconditional upper bounds of the least primitive root u≠±1,v2u\ne \pm 1,{v}^{2} in the prime finite field Fp{{\mathbb{F}}}_{p} have exponential ...
Carella Nelson
doaj   +1 more source

A Universally Composable Linkable Ring Signature Supporting Stealth Addresses

open access: yesMathematics
The linkable ring signature supporting stealth addresses (SALRS) is a recently proposed cryptographic primitive, which is designed to comprehensively address the soundness and privacy requirements associated with concealing the identities of both the ...
Xingkai Wang, Chunping Zhu, Zhen Liu
doaj   +1 more source

A new semiring and its cryptographic applications

open access: yesAIMS Mathematics
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang   +3 more
doaj   +1 more source

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware

open access: bronze, 2010
Stéphane Badel   +7 more
openalex   +1 more source

Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection

open access: yesJournal of Mathematical Cryptology
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj   +1 more source

Home - About - Disclaimer - Privacy