Results 221 to 230 of about 23,331 (249)
Some of the next articles are maybe not open access.

Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation

Journal of Automated Reasoning, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Joana Martinho, António Ravara
openaire   +1 more source

On the Homomorphic Computation of Symmetric Cryptographic Primitives

2013
We present an analysis on the homomorphic computability of different symmetric cryptographic primitives, with the goal of understanding their characteristics with respect to the homomorphic evaluation according to the BGV scheme. Specifically, we start from the framework presented by Gentry, Halevi and Smart for evaluating AES.
S. Mella, R. Susella
openaire   +1 more source

Duality between two cryptographic primitives

1991
This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Yuliang Zheng 0001   +2 more
openaire   +1 more source

Implementing Cryptographic Primitives in the Symbolic Model

2011
When discussing protocol properties in the symbolic (Dolev-Yao; term-based) model of cryptography, the set of cryptographic primitives is defined by the constructors of the term algebra and by the equational theory on top of it. The set of considered primitives is not easily modifiable during the discussion.
openaire   +1 more source

Watermarking Public-Key Cryptographic Primitives

2019
A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Rishab Goyal   +4 more
openaire   +2 more sources

Cryptographic Primitives

2022
Xun Yi   +4 more
openaire   +1 more source

Cryptographic Primitives

2023
Mayank Raikwar, Shuang Wu
openaire   +1 more source

Conventional Cryptographic Primitives

2010
Modern network security systems contain cryptographic primitives as an essential building block. In this chapter, we discuss conventional cryptographic primitives, which are also known as symmetric primitives. The term “symmetric” stems from the fact that in order to use conventional primitives, all parties need to share the same set of secret keys ...
openaire   +1 more source

Cryptographic Primitives And Quantum Theory

Workshop on Physics and Computation, 2005
only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire   +1 more source

Cryptographic Primitives in Blockchain Technology

2020
Abstract Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism.
openaire   +1 more source

Home - About - Disclaimer - Privacy