Results 251 to 260 of about 375,459 (282)
Some of the next articles are maybe not open access.
Duality between two cryptographic primitives
1991This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we present a construction for universal one-way hash functions assuming the existence of one-way permutations.
Tsutomu Matsumoto+2 more
openaire +2 more sources
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
AUSCRYPT, 1990Lawrence Brown, J. Pieprzyk, J. Seberry
semanticscholar +1 more source
A Primer on Cryptographic Primitives and Security Attacks
2018This chapter aims to: (1) Provide a summary of the existing security attacks; (2) Explain the existing cryptographic primitives used as the building blocks of security defence mechanisms; (3) Explain the forces driving the development of hardware-based security solutions; (4) Introduce the physically ...
openaire +2 more sources
Watermarking Public-Key Cryptographic Primitives
2019A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on ...
Nathan Manohar+4 more
openaire +2 more sources
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Fast Software Encryption Workshop, 2003N. Ferguson+5 more
semanticscholar +1 more source
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Chester Rebeiro, Shreya Rajkumar
openaire +2 more sources
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey
IEEE Internet of Things Journal, 2021Muhammad Nauman Khan+2 more
exaly
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Cryptography and Security, 2012U. Rührmair
semanticscholar +1 more source
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Journal of Cryptology, 2017Sam Kim, David J. Wu
semanticscholar +1 more source
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments
Conference on Computer and Communications Security, 2016J. Schneider+3 more
semanticscholar +1 more source