Results 151 to 160 of about 35,343 (264)
Designing secure PUF-based authentication protocols for constrained environments. [PDF]
Lee SW+6 more
europepmc +1 more source
PRIMITIVE MATRICES AND GENERATORS OF PSEUDO RANDOM SEQUENCES OF GALOIS
In theory and practice of information cryptographic protection one of the key problems is the forming a binary pseudo-random sequences (PRS) with a maximum length with acceptable statistical characteristics.
A. Beletsky, E. Beletsky
doaj
Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems [PDF]
Byeori Kim+4 more
openalex +1 more source
Device-independent quantum randomness-enhanced zero-knowledge proof. [PDF]
Li CL+17 more
europepmc +1 more source
Quantum-aided secure deep neural network inference on real quantum computers. [PDF]
Yu H, Ren X, Zhao C, Yang S, McCann J.
europepmc +1 more source
New Cryptographic Primitives Based on Multiword T-Functions [PDF]
Alеxander Klimov, Adi Shamir
openalex +1 more source
Analysis of recent cryptographic primitives
In this thesis, we study the security of some recent cryptographic primitives, both symmetric and asymmetric. Along the way we also consider white-box primitives, which may be regarded as a middle ground between symmetric and asymmetric cryptography. We begin by showing the existence of non-trivial linear maps commuting with the round function of some ...
openaire +2 more sources
Design of Lightweight Chaos based Cryptographic Primitives: A Comparative Analysis [PDF]
Devisha Arunadevi Tiwari, Bhaskar Mondal
openalex +1 more source
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives [PDF]
Maher Alharby
openalex +1 more source