Results 221 to 230 of about 23,331 (249)
Some of the next articles are maybe not open access.
Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
Journal of Automated Reasoning, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Joana Martinho, António Ravara
openaire +1 more source
On the Homomorphic Computation of Symmetric Cryptographic Primitives
2013We present an analysis on the homomorphic computability of different symmetric cryptographic primitives, with the goal of understanding their characteristics with respect to the homomorphic evaluation according to the BGV scheme. Specifically, we start from the framework presented by Gentry, Halevi and Smart for evaluating AES.
S. Mella, R. Susella
openaire +1 more source
Duality between two cryptographic primitives
1991This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Yuliang Zheng 0001 +2 more
openaire +1 more source
Implementing Cryptographic Primitives in the Symbolic Model
2011When discussing protocol properties in the symbolic (Dolev-Yao; term-based) model of cryptography, the set of cryptographic primitives is defined by the constructors of the term algebra and by the equational theory on top of it. The set of considered primitives is not easily modifiable during the discussion.
openaire +1 more source
Watermarking Public-Key Cryptographic Primitives
2019A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Rishab Goyal +4 more
openaire +2 more sources
Conventional Cryptographic Primitives
2010Modern network security systems contain cryptographic primitives as an essential building block. In this chapter, we discuss conventional cryptographic primitives, which are also known as symmetric primitives. The term “symmetric” stems from the fact that in order to use conventional primitives, all parties need to share the same set of secret keys ...
openaire +1 more source
Cryptographic Primitives And Quantum Theory
Workshop on Physics and Computation, 2005only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire +1 more source
Cryptographic Primitives in Blockchain Technology
2020Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire +1 more source

