Results 121 to 130 of about 375,459 (282)
CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
openalex +2 more sources
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
A new semiring and its cryptographic applications
This paper introduced a novel semiring structure involving nonnegative integers, where operations depended on the comparison of the magnitudes of decimal digit sums.
Huawei Huang+3 more
doaj +1 more source
Constructions of Advanced Cryptographic Primitives
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
openaire +1 more source
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source
Cryptographic Primitives with Quasigroup Transformations
AMS Subj. Classification: Primary 20N05, Secondary 94A60 The intention of this research is to justify deployment of quasigroups in cryptography, especially with new quasigroup based cryptographic hash function NaSHA as a runner in the First round of the ongoing NIST SHA-3 competition.
openaire +2 more sources
The Black-Box Model for Cryptographic Primitives [PDF]
C. P. Schnorr, Serge Vaudenay
openalex +1 more source