Results 231 to 240 of about 375,459 (282)
Some of the next articles are maybe not open access.

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security

IACR Cryptology ePrint Archive, 2023
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption ...
Seong-Hak Kim   +10 more
semanticscholar   +1 more source

A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users

Journal of Low Power Electronics, 2007
Most known Sbox Advanced Encryption Standard implementations aim at minimizing chip covered area or achieving high throughput, and usually power consumption is a secondary metric of their cost.
G. Selimis   +4 more
semanticscholar   +1 more source

OpenFHE: Open-Source Fully Homomorphic Encryption Library

IACR Cryptology ePrint Archive, 2022
Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables performing computations over encrypted data without having access to the secret key.
Ahmad Al Badawi   +20 more
semanticscholar   +1 more source

Cryptographic Primitives And Quantum Theory [PDF]

open access: possibleWorkshop on Physics and Computation, 2005
only using public key cryptography, but using quantum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised f rom quantum systems. W e introduce the reader to the notion of cryptographic protocols and describe a number of sample building blocks to achieve them.
openaire   +1 more source

New Cryptographic Primitives

2008 7th Computer Information Systems and Industrial Management Applications, 2008
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature.
openaire   +2 more sources

A Study of Cryptographic Backdoors in Cryptographic Primitives

Electrical Engineering (ICEE), Iranian Conference on, 2018
Since the revelations of Edward Snowden in 2013, the topic of cryptographic backdoors has been popular in both cyber security and popular culture. However, such backdoors were well known in the cryptology community well before 2013. There are a variety of mechanisms for modifying cryptographic primitives so that the resultant modified algorithm is more
openaire   +2 more sources

Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

ACS Nano, 2017
Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS2) by leveraging the natural randomness ...
Abdullah Alharbi   +3 more
semanticscholar   +1 more source

Making Cryptographic Primitives Harder

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008
This paper studies a method for transforming ordinary cryptographic primitives to new harder primitives. Such a method is expected to lead to general schemes that make present cryptosystems secure against the attack of quantum computers. We propose a general technique to construct a new function from an ordinary primitive function f with a help of ...
Hiroyuki Hatanaka   +4 more
openaire   +2 more sources

Random Organic Nanolaser Arrays for Cryptographic Primitives

Advanced Materials, 2019
AbstractNext‐generation high‐security cryptography and communication call for nondeterministic generation and efficient authentication of unclonable bit sequences. Physical unclonable functions using inherent randomness in material and device fabrication process have emerged as promising candidates for realizing one‐way cryptographic systems that avoid
Jiangang Feng, Lei Jiang, Moyuan Cao
exaly   +4 more sources

Implementing Cryptographic Primitives in the Symbolic Model [PDF]

open access: possible, 2011
When discussing protocol properties in the symbolic (Dolev-Yao; term-based) model of cryptography, the set of cryptographic primitives is defined by the constructors of the term algebra and by the equational theory on top of it. The set of considered primitives is not easily modifiable during the discussion.
openaire   +1 more source

Home - About - Disclaimer - Privacy