Results 241 to 250 of about 380,993 (266)
Some of the next articles are maybe not open access.

Foundations of Data Availability Sampling

IACR Commun. Cryptol.
Towards building more scalable blockchains, an approach known as data availability sampling (DAS) has emerged over the past few years. Even large blockchains like Ethereum are planning to eventually deploy DAS to improve their scalability. In a nutshell,
Mathias Hall-Andersen   +2 more
semanticscholar   +1 more source

Quantum Cryptographic Primitives

The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is completely disruptive, since its operation is governed by quantum mechanical phenomena.
openaire   +2 more sources

Cryptographic Primitives with Hinting Property

Journal of Cryptology, 2022
Navid Alamati, Sikhar Patranabis
openaire   +1 more source

On Central Primitives for Quantum Cryptography with Classical Communication

IACR Cryptology ePrint Archive
Recent work has introduced the"Quantum-Computation Classical-Communication"(QCCC) (Chung et. al.) setting for cryptography. There has been some evidence that One Way Puzzles (OWPuzz) are the natural central cryptographic primitive for this setting ...
Kai-Min Chung, Eli Goldin, Matthew Gray
semanticscholar   +1 more source

Verification of a cryptographic primitive: SHA-256 (abstract)

ACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2015
A. Appel
semanticscholar   +1 more source

A Calculus for Concurrent Processes with Cryptographic Primitives

Applied Mechanics and Materials, 2014
We introduce cryptographic primitives to the symbolic transition graph with the binary equivalence relation based on the CCS language with value-passing processes, which is designed for the description and analysis of security protocols. The STGR with cryptographic primitives, which is an extension of the STG, is applied to partition domains of ...
openaire   +2 more sources

Cryptographic Primitives that Resist Backdooring and Subversion

2020
The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security. The presumably most expensive of these surveillance programs is the NSA's decryption program, Bullrun, which aims at breaking and sabotaging ...
openaire   +2 more sources

Duality between two cryptographic primitives

1991
This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Tsutomu Matsumoto   +2 more
openaire   +2 more sources

Algebraic Frameworks for Cryptographic Primitives

2020
A fundamental goal in theoretical cryptography is to identify the conceptually simplest abstractions that generically imply a collection of other cryptographic primitives. For symmetric-key primitives, this goal has been accomplished by showing that one-way functions are necessary and sufficient to realize primitives ranging from symmetric-key ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy