Results 221 to 230 of about 367,345 (251)
Some of the next articles are maybe not open access.

Cryptographic Primitives And Quantum Theory

Workshop on Physics and Computation, 2005
only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire   +1 more source

Foundations of Data Availability Sampling

IACR Commun. Cryptol.
Towards building more scalable blockchains, an approach known as data availability sampling (DAS) has emerged over the past few years. Even large blockchains like Ethereum are planning to eventually deploy DAS to improve their scalability. In a nutshell,
Mathias Hall-Andersen   +2 more
semanticscholar   +1 more source

Cryptographic Primitives

2022
Xun Yi   +4 more
openaire   +1 more source

Analysis of Lightweight Cryptographic Primitives

2022
An Internet-of-Things (IoT) device is a single-purpose computer that operates with less computing resources and sometimes on battery power. The classification of IoT can range anywhere from motion sensors to a doorbell camera, but IoT devices are used in more than just home automation. The medical and industrial spaces use simple wireless computers for
openaire   +1 more source

Security of Lightweight Cryptographic Primitives

2021
Cryptography, or the encrypting of data, has drawn widespread interest for years, initially sparking public concern through headlines and dramatized reenactments of hackers targeting security protocols. Previous cryptographic research commonly focused on developing the quickest, most secure ways to encrypt information on high-power computers.
openaire   +1 more source

Verification of a cryptographic primitive: SHA-256 (abstract)

ACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2015
A. Appel
semanticscholar   +1 more source

PROGRAM IMPLEMENTATION OF CRYPTOGRAPHIC PRIMITIVES

Computer systems and network
Developed on the C# platform (.NET Framework 5.0), which provides high flexibility in work, a program for performing operations (addition, multiplication, raising to the power of a large natural number, finding the inverse relatively to multiplication) on elements of extended finite fields and general linear groups over such fields.
B.R. Popovych, R.B. Popovych
openaire   +1 more source

Watermarking Public-Key Cryptographic Primitives

2019
A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Rishab Goyal   +4 more
openaire   +1 more source

A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users

Journal of Low Power Electronics, 2007
G. Selimis   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy