Results 11 to 20 of about 35,941 (264)

On the Use of GF-Inversion as a Cryptographic Primitive [PDF]

open access: bronze, 2004
Inversion in Galois Fields is a famous primitive permutation for designing cryptographic algorithms e.g. for Rijndael because it has suitable differential and linear properties. Inputs and outputs are usually transformed by addition (e.g. XOR) to key bits. We call this construction the APA (Add-Permute-Add) scheme.
Kazumaro Aoki, Serge Vaudenay
openalex   +4 more sources

Using quantum key distribution for cryptographic purposes: A survey

open access: yesTheoretical Computer Science, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
exaly   +3 more sources

Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning [PDF]

open access: green2024 IEEE 42nd International Conference on Computer Design (ICCD)
Side-channel attacks allow to extract sensitive information from cryptographic primitives by correlating the partially known computed data and the measured side-channel signal. Starting from the raw side-channel trace, the preprocessing of the side-channel trace to pinpoint the time at which each cryptographic primitive is executed, and, then, to re ...
Davide Galli   +2 more
arxiv   +3 more sources

Verification of a Cryptographic Primitive [PDF]

open access: bronzeACM Transactions on Programming Languages and Systems, 2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
Andrew W. Appel
openalex   +3 more sources

Cryptographic primitives based on compact knapsack problem [PDF]

open access: greenJournal of Information Security and Applications
In the present paper, we extend previous results of an id scheme based on compact knapsack problem defined by one equation. We present a sound three-move id scheme based on compact knapsack problem defined by an integer matrix. We study this problem by providing attacks based on lattices.
Georgios Rizos   +1 more
openalex   +3 more sources

Bio-inspired electronic fingerprint PUF device with single-walled carbon nanotube network surface mediated by M13 bacteriophage template [PDF]

open access: yesScientific Reports, 2022
Human fingerprints are randomly created during fetal activity in the womb, resulting in unique and physically irreproducible fingerprint patterns that are applicable as a biological cryptographic primitive. Similarly, stochastically knitted single-walled
Jae-Seung Jeong   +4 more
doaj   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Linear Complexity of Hidden Weighted Bit Functions [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

New number-theoretic cryptographic primitives [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Brier, Éric   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy