Results 201 to 210 of about 388,006 (269)
Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine. [PDF]
Lee HJ +6 more
europepmc +1 more source
A language-dependent cryptographic primitive
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
openaire +3 more sources
Verification of a Cryptographic Primitive
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
A. Appel
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptographic Primitives with Hinting Property
Journal of Cryptology, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alamati, Navid, Patranabis, Sikhar
openaire +2 more sources
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security
IACR Cryptology ePrint Archive, 2023Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption ...
Seong-Hak Kim +10 more
semanticscholar +1 more source
Making Cryptographic Primitives Harder
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008This paper studies a method for transforming ordinary cryptographic primitives to new harder primitives. Such a method is expected to lead to general schemes that make present cryptosystems secure against the attack of quantum computers. We propose a general technique to construct a new function from an ordinary primitive function f with a help of ...
S. HASEGAWA +4 more
openaire +1 more source
2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source

