Results 11 to 20 of about 388,006 (269)

Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]

open access: greenSmart Card Research and Advanced Application Conference, 2013
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Petr Sušil, Serge Vaudenay
semanticscholar   +5 more sources

Non-cryptographic primitive for pseudorandom permutation [PDF]

open access: yesTheoretical Computer Science, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Iwata, Tetsu   +2 more
openaire   +2 more sources

A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System

open access: yesIEEE Access, 2019
Substitution permutation network (SP-network) is a chain of linked mathematical primitives used in block cipher algorithms. The proposed novel design of cryptographic SP-network consists of three cryptographic primitives: substitution box, permutation ...
Muhammad Fahad Khan   +3 more
doaj   +2 more sources

Single-photon advantage in quantum cryptography beyond QKD [PDF]

open access: yesNature Communications
Quantum key distribution (QKD) can be used to establish a secret key between trusted parties. Many practical use-cases in communication networks, however, involve parties who do not trust each other.
Daniel A. Vajner   +10 more
doaj   +2 more sources

Cryptographic primitives based on cellular transformations [PDF]

open access: greenComputer Science Journal of Moldova, 2003
Design of cryptographic primitives based on the concept of cellular automata (CA) is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA) is considered ...
B.V. Izotov
doaj   +1 more source

Algebraic Frameworks for Cryptographic Primitives

open access: green, 2020
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
Navid Alamati
openalex   +4 more sources

New number-theoretic cryptographic primitives [PDF]

open access: hybridJournal of Mathematical Cryptology, 2019
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Éric Brier   +3 more
openalex   +3 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Linear Complexity of Hidden Weighted Bit Functions [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj   +1 more source

Home - About - Disclaimer - Privacy