Results 201 to 210 of about 1,355 (213)
Some of the next articles are maybe not open access.
Quantum Cryptographic Primitives
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.openaire +2 more sources
Security of Lightweight Cryptographic Primitives
2021Cryptography, or the encrypting of data, has drawn widespread interest for years, initially sparking public concern through headlines and dramatized reenactments of hackers targeting security protocols. Previous cryptographic research commonly focused on developing the quickest, most secure ways to encrypt information on high-power computers.
openaire +1 more source
Controlled Operations as a Cryptographic Primitive
2001Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length.
Boris V. Izotov +2 more
openaire +1 more source
Cryptographic Primitives in Blockchain Technology
2020Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire +1 more source
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Shreya Rajkumar, Chester Rebeiro
openaire +1 more source
Threshold schemes for cryptographic primitives:
2019Luís T.A.N. Brandão +2 more
openaire +1 more source

