Results 211 to 220 of about 367,345 (251)
Some of the next articles are maybe not open access.
OpenFHE: Open-Source Fully Homomorphic Encryption Library
IACR Cryptology ePrint Archive, 2022Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
A. Al Badawi +20 more
semanticscholar +1 more source
2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +1 more source
2020
Abstract This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and ...
openaire +1 more source
Abstract This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and ...
openaire +1 more source
Post-Quantum Cryptographic Primitives
2020The necessity of cyber-security is becoming apparent as we grow increasingly dependent on technology in our daily lives. Cybersecurity allows us to protect our digital information that is stored and transferred via the Internet. Because of this growing dependence, this research project endeavours to design, construct and evaluate new post-quantum ...
openaire +1 more source
A Study of Cryptographic Backdoors in Cryptographic Primitives
Electrical Engineering (ICEE), Iranian Conference on, 2018Since the revelations of Edward Snowden in 2013, the topic of cryptographic backdoors has been popular in both cyber security and popular culture. However, such backdoors were well known in the cryptology community well before 2013. There are a variety of mechanisms for modifying cryptographic primitives so that the resultant modified algorithm is more
openaire +1 more source
Conventional Cryptographic Primitives
2010Modern network security systems contain cryptographic primitives as an essential building block. In this chapter, we discuss conventional cryptographic primitives, which are also known as symmetric primitives. The term “symmetric” stems from the fact that in order to use conventional primitives, all parties need to share the same set of secret keys ...
openaire +1 more source
Duality between two cryptographic primitives
1991This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Yuliang Zheng +2 more
openaire +1 more source
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
IACR Cryptology ePrint Archive, 2023E. Bellini +6 more
semanticscholar +1 more source
Quantum Cryptographic Primitives
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.openaire +2 more sources

