Results 181 to 190 of about 1,355 (213)
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL. [PDF]
Zhang Y, Duan P, Li C, Ahmad H, Zhang H.
europepmc +1 more source
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives
S. Sree Vivek +3 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptographic Primitives with Hinting Property
Journal of Cryptology, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alamati, Navid, Patranabis, Sikhar
openaire +2 more sources
The Black-Box Model for Cryptographic Primitives
Journal of Cryptology, 1998To investigate security properties of a cryptographic primitive it is useful to grasp the idea a class of attacks is based on. Having a model that describes essential features of the primitive without unnecessary details one can concentrate on what makes the primitive resistant to what class of attacks.
Schnorr, Claus Peter, Vaudenay, Serge
openaire +2 more sources
A Study of Cryptographic Backdoors in Cryptographic Primitives
Electrical Engineering (ICEE), Iranian Conference on, 2018Since the revelations of Edward Snowden in 2013, the topic of cryptographic backdoors has been popular in both cyber security and popular culture. However, such backdoors were well known in the cryptology community well before 2013. There are a variety of mechanisms for modifying cryptographic primitives so that the resultant modified algorithm is more
openaire +1 more source
A language-dependent cryptographic primitive
Journal of Cryptology, 1997zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
openaire +2 more sources
2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source

