Results 221 to 230 of about 375,459 (282)
Design and Improvements of anonymous cryptographic primitives
Olivier Sanders
openalex +1 more source
Cryptography based on quadratic fields: cryptanalyses, primitives and protocols
Guilhem Castagnos
openalex +1 more source
A secure transaction and smart contract architecture for internet of vehicles. [PDF]
Lin HY.
europepmc +1 more source
Identity-Based Matchmaking Encryption with Equality Test. [PDF]
Yan Z, Lin X, Zhang X, Xu J, Qu H.
europepmc +1 more source
Tunable stochastic memristors for energy-efficient encryption and computing. [PDF]
Woo KS+6 more
europepmc +1 more source
Design of Covert Communication Waveform Based on Phase Randomization. [PDF]
Zhou W, Wang Z, Shi J, Guo Q.
europepmc +1 more source
On the Bit Security of Cryptographic Primitives
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space.
Daniele Micciancio, Michael Walter
semanticscholar +3 more sources
Controlled Operations as a Cryptographic Primitive [PDF]
Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length.
B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar +2 more sources