Results 201 to 210 of about 388,006 (269)

A language-dependent cryptographic primitive

open access: yesJournal of Cryptology, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
openaire   +3 more sources

Verification of a Cryptographic Primitive

open access: yesACM Transactions on Programming Languages and Systems, 2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect to the operational semantics for
A. Appel
openaire   +2 more sources

Cryptographic Primitives with Hinting Property

Journal of Cryptology, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alamati, Navid, Patranabis, Sikhar
openaire   +2 more sources

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security

IACR Cryptology ePrint Archive, 2023
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption ...
Seong-Hak Kim   +10 more
semanticscholar   +1 more source

Making Cryptographic Primitives Harder

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008
This paper studies a method for transforming ordinary cryptographic primitives to new harder primitives. Such a method is expected to lead to general schemes that make present cryptosystems secure against the attack of quantum computers. We propose a general technique to construct a new function from an ordinary primitive function f with a help of ...
S. HASEGAWA   +4 more
openaire   +1 more source

New Cryptographic Primitives

2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire   +1 more source

Home - About - Disclaimer - Privacy