Results 221 to 230 of about 367,345 (251)
Some of the next articles are maybe not open access.
Cryptographic Primitives And Quantum Theory
Workshop on Physics and Computation, 2005only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire +1 more source
Foundations of Data Availability Sampling
IACR Commun. Cryptol.Towards building more scalable blockchains, an approach known as data availability sampling (DAS) has emerged over the past few years. Even large blockchains like Ethereum are planning to eventually deploy DAS to improve their scalability. In a nutshell,
Mathias Hall-Andersen +2 more
semanticscholar +1 more source
Analysis of Lightweight Cryptographic Primitives
2022An Internet-of-Things (IoT) device is a single-purpose computer that operates with less computing resources and sometimes on battery power. The classification of IoT can range anywhere from motion sensors to a doorbell camera, but IoT devices are used in more than just home automation. The medical and industrial spaces use simple wireless computers for
openaire +1 more source
Security of Lightweight Cryptographic Primitives
2021Cryptography, or the encrypting of data, has drawn widespread interest for years, initially sparking public concern through headlines and dramatized reenactments of hackers targeting security protocols. Previous cryptographic research commonly focused on developing the quickest, most secure ways to encrypt information on high-power computers.
openaire +1 more source
Verification of a cryptographic primitive: SHA-256 (abstract)
ACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2015A. Appel
semanticscholar +1 more source
PROGRAM IMPLEMENTATION OF CRYPTOGRAPHIC PRIMITIVES
Computer systems and networkDeveloped on the C# platform (.NET Framework 5.0), which provides high flexibility in work, a program for performing operations (addition, multiplication, raising to the power of a large natural number, finding the inverse relatively to multiplication) on elements of extended finite fields and general linear groups over such fields.
B.R. Popovych, R.B. Popovych
openaire +1 more source
Watermarking Public-Key Cryptographic Primitives
2019A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Rishab Goyal +4 more
openaire +1 more source
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
AUSCRYPT, 1990Lawrence Brown, J. Pieprzyk, J. Seberry
semanticscholar +1 more source

