Results 171 to 180 of about 21,314 (180)
Some of the next articles are maybe not open access.

Cryptographic Applications of Primitive Pythagorean Triples

Cryptologia, 2014
Abstract This article presents properties of primitive Pythagorean triples (PPTs) that have potential applications to cryptography. It shows that the six classes of primitive Pythagorean triples can be put into two groups, and autocorrelation and cross-correlation functions of the six classes derived from the gaps between each class type have been ...
Subhash Kak, Monisha Prabhu
openaire   +2 more sources

Quantum Cryptographic Primitives

The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.
openaire   +2 more sources

Cryptographic Primitives with Hinting Property

Journal of Cryptology, 2022
Navid Alamati, Sikhar Patranabis
openaire   +1 more source

A Calculus for Concurrent Processes with Cryptographic Primitives

Applied Mechanics and Materials, 2014
We introduce cryptographic primitives to the symbolic transition graph with the binary equivalence relation based on the CCS language with value-passing processes, which is designed for the description and analysis of security protocols. The STGR with cryptographic primitives, which is an extension of the STG, is applied to partition domains of ...
openaire   +2 more sources

Cryptographic Primitives that Resist Backdooring and Subversion

2020
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
openaire   +2 more sources

Duality between two cryptographic primitives

1991
This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Tsutomu Matsumoto   +2 more
openaire   +2 more sources

Algebraic Frameworks for Cryptographic Primitives

2020
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
openaire   +2 more sources

A Primer on Cryptographic Primitives and Security Attacks

2018
This chapter aims to: (1) Provide a summary of the existing security attacks; (2) Explain the existing cryptographic primitives used as the building blocks of security defence mechanisms; (3) Explain the forces driving the development of hardware-based security solutions; (4) Introduce the physically ...
openaire   +2 more sources

Implementation of Cryptographic Primitives

International Journal of Engineering Trends and Technology, 2017
Chester Rebeiro, Shreya Rajkumar
openaire   +2 more sources

Home - About - Disclaimer - Privacy