Results 241 to 250 of about 380,993 (266)
Some of the next articles are maybe not open access.
Foundations of Data Availability Sampling
IACR Commun. Cryptol.Towards building more scalable blockchains, an approach known as data availability sampling (DAS) has emerged over the past few years. Even large blockchains like Ethereum are planning to eventually deploy DAS to improve their scalability. In a nutshell,
Mathias Hall-Andersen +2 more
semanticscholar +1 more source
Quantum Cryptographic Primitives
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.openaire +2 more sources
Cryptographic Primitives with Hinting Property
Journal of Cryptology, 2022Navid Alamati, Sikhar Patranabis
openaire +1 more source
On Central Primitives for Quantum Cryptography with Classical Communication
IACR Cryptology ePrint ArchiveRecent work has introduced the"Quantum-Computation Classical-Communication"(QCCC) (Chung et. al.) setting for cryptography. There has been some evidence that One Way Puzzles (OWPuzz) are the natural central cryptographic primitive for this setting ...
Kai-Min Chung, Eli Goldin, Matthew Gray
semanticscholar +1 more source
Verification of a cryptographic primitive: SHA-256 (abstract)
ACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2015A. Appel
semanticscholar +1 more source
A Calculus for Concurrent Processes with Cryptographic Primitives
Applied Mechanics and Materials, 2014We introduce cryptographic primitives to the symbolic transition graph with the binary equivalence relation based on the CCS language with value-passing processes, which is designed for the description and analysis of security protocols. The STGR with cryptographic primitives, which is an extension of the STG, is applied to partition domains of ...
openaire +2 more sources
Cryptographic Primitives that Resist Backdooring and Subversion
2020The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
openaire +2 more sources
Duality between two cryptographic primitives
1991This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Tsutomu Matsumoto +2 more
openaire +2 more sources
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
AUSCRYPT, 1990Lawrence Brown, J. Pieprzyk, J. Seberry
semanticscholar +1 more source
Algebraic Frameworks for Cryptographic Primitives
2020A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
openaire +2 more sources

