Results 221 to 230 of about 380,993 (266)
Blockchain assisted signature and certificate based protocol for efficient data protection and transaction management in smart grids. [PDF]
Mutlaq KA +7 more
europepmc +1 more source
Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution. [PDF]
Termos H.
europepmc +1 more source
Design and Improvements of anonymous cryptographic primitives
Olivier Sanders
openalex +1 more source
Cryptography based on quadratic fields: cryptanalyses, primitives and protocols
Guilhem Castagnos
openalex +1 more source
Controlled Operations as a Cryptographic Primitive [PDF]
Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length.
B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security
IACR Cryptology ePrint Archive, 2023Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption ...
Seong-Hak Kim +10 more
semanticscholar +1 more source
OpenFHE: Open-Source Fully Homomorphic Encryption Library
IACR Cryptology ePrint Archive, 2022Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
Ahmad Al Badawi +20 more
semanticscholar +1 more source
Cryptographic Primitives And Quantum Theory [PDF]
only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire +1 more source

