Results 121 to 130 of about 35,941 (264)
On the cryptographic properties of “Limonnik-3” AKE scheme
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj +1 more source
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery ...
arxiv
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems [PDF]
Benny Applebaum+3 more
openalex +1 more source
Quantum Security of Cryptographic Primitives
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be ...
openaire +2 more sources
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing [PDF]
Automated Cryptographic Validation Protocol (ACVP) is an existing protocol that is used to validate a software or hardware cryptographic module automatically. In this work, we present a system providing the method and tools to produce well-covering tests in ACVP format for cryptographic libraries.
arxiv
Constructions of Advanced Cryptographic Primitives [PDF]
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
openaire +1 more source
The least primitive roots mod p
Let p>1p\gt 1 be a large prime number, and let ε>0\varepsilon \gt 0 be a small number. The established unconditional upper bounds of the least primitive root u≠±1,v2u\ne \pm 1,{v}^{2} in the prime finite field Fp{{\mathbb{F}}}_{p} have exponential ...
Carella Nelson
doaj +1 more source
CURRENT APPROACHES IN MODERN CRYPTOLOGY [PDF]
This work proposes a brief analysis of the different types of current approaches to modern cryptology in present days. Due to increased development of communications and IT technologies, the field of cryptography practical approaches exceeded your ...
Mircea Andraşiu
core
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
openalex +2 more sources