Results 141 to 150 of about 35,941 (264)
The Black-Box Model for Cryptographic Primitives [PDF]
C. P. Schnorr, Serge Vaudenay
openalex +1 more source
On Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials [PDF]
Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential.
arxiv
Twin physically unclonable cryptographic primitives enabled by aligned carbon nanotube arrays [PDF]
Zhiyong Zhang+9 more
openalex +1 more source
On the Round Security of Symmetric-Key Cryptographic Primitives [PDF]
Zulfikar Ramzan, Leonid Reyzin
openalex +1 more source
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices [PDF]
Mo Zhang+3 more
openalex +1 more source
Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [PDF]
Fundamental principles of quantum mechanics have inspired many new research directions, particularly in quantum cryptography. One such principle is quantum no-cloning which has led to the emerging field of revocable cryptography. Roughly speaking, in a revocable cryptographic primitive, a cryptographic object (such as a ciphertext or program) is ...
arxiv
An Algebraic Approach to Symmetric Linear Layers in Cryptographic Primitives [PDF]
Robert Christian Subroto
openalex +1 more source
Analysis of recent cryptographic primitives
In this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some ...
openaire +2 more sources