Results 11 to 20 of about 388,006 (269)
Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Petr Sušil, Serge Vaudenay
semanticscholar +5 more sources
Non-cryptographic primitive for pseudorandom permutation [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Iwata, Tetsu +2 more
openaire +2 more sources
Uncloneable Cryptographic Primitives with Interaction [PDF]
44 pages, 3 ...
Anne Broadbent, Eric Culf
openalex +3 more sources
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System
Substitution permutation network (SP-network) is a chain of linked mathematical primitives used in block cipher algorithms. The proposed novel design of cryptographic SP-network consists of three cryptographic primitives: substitution box, permutation ...
Muhammad Fahad Khan +3 more
doaj +2 more sources
Single-photon advantage in quantum cryptography beyond QKD [PDF]
Quantum key distribution (QKD) can be used to establish a secret key between trusted parties. Many practical use-cases in communication networks, however, involve parties who do not trust each other.
Daniel A. Vajner +10 more
doaj +2 more sources
Cryptographic primitives based on cellular transformations [PDF]
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj +1 more source
Algebraic Frameworks for Cryptographic Primitives
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
Navid Alamati
openalex +4 more sources
New number-theoretic cryptographic primitives [PDF]
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Éric Brier +3 more
openalex +3 more sources
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj +1 more source
Linear Complexity of Hidden Weighted Bit Functions [PDF]
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj +1 more source

