Results 221 to 230 of about 388,006 (269)
Some of the next articles are maybe not open access.
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
IACR Cryptology ePrint Archive, 2023E. Bellini +6 more
semanticscholar +1 more source
Analysis of Lightweight Cryptographic Primitives
2022An Internet-of-Things (IoT) device is a single-purpose computer that operates with less computing resources and sometimes on battery power. The classification of IoT can range anywhere from motion sensors to a doorbell camera, but IoT devices are used in more than just home automation. The medical and industrial spaces use simple wireless computers for
openaire +1 more source
Foundations of Data Availability Sampling
IACR Commun. Cryptol.Towards building more scalable blockchains, an approach known as data availability sampling (DAS) has emerged over the past few years. Even large blockchains like Ethereum are planning to eventually deploy DAS to improve their scalability. In a nutshell,
Mathias Hall-Andersen +2 more
semanticscholar +1 more source
A new cryptographic primitive for noise tolerant template security
Pattern Recognition Letters, 2016Koray Karabina, Onur Canpolat
semanticscholar +1 more source
Security of Lightweight Cryptographic Primitives
2021Cryptography, or the encrypting of data, has drawn widespread interest for years, initially sparking public concern through headlines and dramatized reenactments of hackers targeting security protocols. Previous cryptographic research commonly focused on developing the quickest, most secure ways to encrypt information on high-power computers.
openaire +1 more source
Verification of a cryptographic primitive: SHA-256 (abstract)
ACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2015A. Appel
semanticscholar +1 more source
PROGRAM IMPLEMENTATION OF CRYPTOGRAPHIC PRIMITIVES
Computer systems and networkDeveloped on the C# platform (.NET Framework 5.0), which provides high flexibility in work, a program for performing operations (addition, multiplication, raising to the power of a large natural number, finding the inverse relatively to multiplication) on elements of extended finite fields and general linear groups over such fields.
B.R. Popovych, R.B. Popovych
openaire +1 more source
Watermarking Public-Key Cryptographic Primitives
2019A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Rishab Goyal +4 more
openaire +1 more source
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
AUSCRYPT, 1990Lawrence Brown, J. Pieprzyk, J. Seberry
semanticscholar +1 more source

