On the Use of GF-Inversion as a Cryptographic Primitive [PDF]
Inversion in Galois Fields is a famous primitive permutation for designing cryptographic algorithms e.g. for Rijndael because it has suitable differential and linear properties. Inputs and outputs are usually transformed by addition (e.g. XOR) to key bits. We call this construction the APA (Add-Permute-Add) scheme.
Kazumaro Aoki, Serge Vaudenay
openalex +4 more sources
Using quantum key distribution for cryptographic purposes: A survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,+23 more
exaly +3 more sources
Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning [PDF]
Side-channel attacks allow to extract sensitive information from cryptographic primitives by correlating the partially known computed data and the measured side-channel signal. Starting from the raw side-channel trace, the preprocessing of the side-channel trace to pinpoint the time at which each cryptographic primitive is executed, and, then, to re ...
Davide Galli+2 more
arxiv +3 more sources
Verification of a Cryptographic Primitive [PDF]
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
Andrew W. Appel
openalex +3 more sources
Cryptographic primitives based on compact knapsack problem [PDF]
In the present paper, we extend previous results of an id scheme based on compact knapsack problem defined by one equation. We present a sound three-move id scheme based on compact knapsack problem defined by an integer matrix. We study this problem by providing attacks based on lattices.
Georgios Rizos+1 more
openalex +3 more sources
Bio-inspired electronic fingerprint PUF device with single-walled carbon nanotube network surface mediated by M13 bacteriophage template [PDF]
Human fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled
Jae-Seung Jeong+4 more
doaj +2 more sources
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj +1 more source
Linear Complexity of Hidden Weighted Bit Functions [PDF]
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj +1 more source
Performance analysis of energy efficient improved LEACH protocol in IoT networks
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia+3 more
wiley +1 more source
New number-theoretic cryptographic primitives [PDF]
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Brier, Éric+3 more
openaire +4 more sources