Results 11 to 20 of about 380,993 (266)

CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives [PDF]

open access: yesInformation, 2018
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased.
Gregory Hill, Xavier Bellekens
openaire   +8 more sources

The Black-Box Model for Cryptographic Primitives [PDF]

open access: bronzeJournal of Cryptology, 1998
To investigate security properties of a cryptographic primitive it is useful to grasp the idea a class of attacks is based on. Having a model that describes essential features of the primitive without unnecessary details one can concentrate on what makes the primitive resistant to what class of attacks.
C. P. Schnorr, Serge Vaudenay
openalex   +4 more sources

Constructions of Advanced Cryptographic Primitives

open access: bronze, 2023
Dans cette thèse, nous proposons des constructions efficaces de primitives cryptographiques avec des fonctionnalités avancées. Nous nous concentrons sur des primitives qui permettent des applications préservant la confidentialité, telles que la recherche sur des données chiffrées ou le vote électronique, avec une sécurité prouvable dans le modèle de l ...
Michael Reichle
openalex   +4 more sources

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware

open access: bronzeWorkshop on Cryptographic Hardware and Embedded Systems, 2010
Stéphane Badel   +7 more
openalex   +2 more sources

Cryptographic primitives based on cellular transformations [PDF]

open access: yesComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj   +2 more sources

On the Use of GF-Inversion as a Cryptographic Primitive [PDF]

open access: bronzeACM Symposium on Applied Computing, 2004
Kazumaro Aoki, Serge Vaudenay
openalex   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Linear Complexity of Hidden Weighted Bit Functions [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj   +1 more source

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship, 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar   +2 more
doaj   +1 more source

Non-cryptographic primitive for pseudorandom permutation [PDF]

open access: yesTheoretical Computer Science, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tetsu Iwata   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy