Results 11 to 20 of about 367,345 (251)

Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]

open access: goldSmart Card Research and Advanced Application Conference, 2013
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Petr Sušil, Serge Vaudenay
semanticscholar   +5 more sources

A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System

open access: yesIEEE Access, 2019
Substitution permutation network (SP-network) is a chain of linked mathematical primitives used in block cipher algorithms. The proposed novel design of cryptographic SP-network consists of three cryptographic primitives: substitution box, permutation ...
Muhammad Fahad Khan   +3 more
doaj   +2 more sources

A language-dependent cryptographic primitive

open access: yesJournal of Cryptology, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
openaire   +3 more sources

Verification of a Cryptographic Primitive

open access: yesACM Transactions on Programming Languages and Systems, 2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
A. Appel
openaire   +2 more sources

Cryptographic primitives based on cellular transformations [PDF]

open access: greenComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj   +1 more source

Algebraic Frameworks for Cryptographic Primitives

open access: green, 2020
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
Navid Alamati
openalex   +4 more sources

New number-theoretic cryptographic primitives [PDF]

open access: hybridJournal of Mathematical Cryptology, 2019
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Éric Brier   +3 more
openalex   +3 more sources

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols [PDF]

open access: yesAdvanced Science, Volume 12, Issue 46, December 11, 2025.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Home - About - Disclaimer - Privacy