Results 221 to 230 of about 375,459 (282)

Tunable stochastic memristors for energy-efficient encryption and computing. [PDF]

open access: yesNat Commun
Woo KS   +6 more
europepmc   +1 more source

On the Bit Security of Cryptographic Primitives

open access: yesIACR Cryptology ePrint Archive, 2018
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space.
Daniele Micciancio, Michael Walter
semanticscholar   +3 more sources

Controlled Operations as a Cryptographic Primitive [PDF]

open access: possibleMathematical Methods, Models, and Architectures for Network Security Systems, 2001
Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length.
B. Izotov, A. Moldovyan, N. Moldovyan
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy