Results 231 to 240 of about 375,459 (282)
Some of the next articles are maybe not open access.
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security
IACR Cryptology ePrint Archive, 2023Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption ...
Seong-Hak Kim+10 more
semanticscholar +1 more source
Journal of Low Power Electronics, 2007
Most known Sbox Advanced Encryption Standard implementations aim at minimizing chip covered area or achieving high throughput, and usually power consumption is a secondary metric of their cost.
G. Selimis+4 more
semanticscholar +1 more source
Most known Sbox Advanced Encryption Standard implementations aim at minimizing chip covered area or achieving high throughput, and usually power consumption is a secondary metric of their cost.
G. Selimis+4 more
semanticscholar +1 more source
OpenFHE: Open-Source Fully Homomorphic Encryption Library
IACR Cryptology ePrint Archive, 2022Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
Ahmad Al Badawi+20 more
semanticscholar +1 more source
Cryptographic Primitives And Quantum Theory [PDF]
only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire +1 more source
2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +2 more sources
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire +2 more sources
A Study of Cryptographic Backdoors in Cryptographic Primitives
Electrical Engineering (ICEE), Iranian Conference on, 2018Since the revelations of Edward Snowden in 2013, the topic of cryptographic backdoors has been popular in both cyber security and popular culture. However, such backdoors were well known in the cryptology community well before 2013. There are a variety of mechanisms for modifying cryptographic primitives so that the resultant modified algorithm is more
openaire +2 more sources
Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.
ACS Nano, 2017Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS2) by leveraging the natural randomness ...
Abdullah Alharbi+3 more
semanticscholar +1 more source
Making Cryptographic Primitives Harder
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008This paper studies a method for transforming ordinary cryptographic primitives to new harder primitives. Such a method is expected to lead to general schemes that make present cryptosystems secure against the attack of quantum computers. We propose a general technique to construct a new function from an ordinary primitive function f with a help of ...
Hiroyuki Hatanaka+4 more
openaire +2 more sources
Random Organic Nanolaser Arrays for Cryptographic Primitives
Advanced Materials, 2019AbstractNext‐generation high‐security cryptography and communication call for nondeterministic generation and efficient authentication of unclonable bit sequences. Physical unclonable functions using inherent randomness in material and device fabrication process have emerged as promising candidates for realizing one‐way cryptographic systems that avoid
Jiangang Feng, Lei Jiang, Moyuan Cao
exaly +4 more sources
Implementing Cryptographic Primitives in the Symbolic Model [PDF]
When discussing protocol properties in the symbolic (Dolev-Yao; term-based) model of cryptography, the set of cryptographic primitives is defined by the constructors of the term algebra and by the equational theory on top of it. The set of considered primitives is not easily modifiable during the discussion.
openaire +1 more source