Results 171 to 180 of about 21,314 (180)
Some of the next articles are maybe not open access.
Cryptographic Applications of Primitive Pythagorean Triples
Cryptologia, 2014Abstract This article presents properties of primitive Pythagorean triples (PPTs) that have potential applications to cryptography. It shows that the six classes of primitive Pythagorean triples can be put into two groups, and autocorrelation and cross-correlation functions of the six classes derived from the gaps between each class type have been ...
Subhash Kak, Monisha Prabhu
openaire +2 more sources
Quantum Cryptographic Primitives
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.openaire +2 more sources
Cryptographic Primitives with Hinting Property
Journal of Cryptology, 2022Navid Alamati, Sikhar Patranabis
openaire +1 more source
A Calculus for Concurrent Processes with Cryptographic Primitives
Applied Mechanics and Materials, 2014We introduce cryptographic primitives to the symbolic transition graph with the binary equivalence relation based on the CCS language with value-passing processes, which is designed for the description and analysis of security protocols. The STGR with cryptographic primitives, which is an extension of the STG, is applied to partition domains of ...
openaire +2 more sources
Cryptographic Primitives that Resist Backdooring and Subversion
2020The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
openaire +2 more sources
Duality between two cryptographic primitives
1991This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Tsutomu Matsumoto+2 more
openaire +2 more sources
Algebraic Frameworks for Cryptographic Primitives
2020A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
openaire +2 more sources
A Primer on Cryptographic Primitives and Security Attacks
2018This chapter aims to: (1) Provide a summary of the existing security attacks; (2) Explain the existing cryptographic primitives used as the building blocks of security defence mechanisms; (3) Explain the forces driving the development of hardware-based security solutions; (4) Introduce the physically ...
openaire +2 more sources
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Chester Rebeiro, Shreya Rajkumar
openaire +2 more sources