Results 151 to 160 of about 35,343 (264)

Designing secure PUF-based authentication protocols for constrained environments. [PDF]

open access: yesSci Rep, 2023
Lee SW   +6 more
europepmc   +1 more source

PRIMITIVE MATRICES AND GENERATORS OF PSEUDO RANDOM SEQUENCES OF GALOIS

open access: yesÌнформаційні технології в освіті, 2014
In theory and practice of information cryptographic protection one of the key problems is the forming a binary pseudo-random sequences (PRS) with a maximum length with acceptable statistical characteristics.
A. Beletsky, E. Beletsky
doaj  

Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems [PDF]

open access: hybrid, 2023
Byeori Kim   +4 more
openalex   +1 more source

Device-independent quantum randomness-enhanced zero-knowledge proof. [PDF]

open access: yesProc Natl Acad Sci U S A, 2023
Li CL   +17 more
europepmc   +1 more source

Analysis of recent cryptographic primitives

open access: yes, 2016
In this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy