Results 251 to 260 of about 380,993 (266)
Some of the next articles are maybe not open access.

A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users

Journal of Low Power Electronics, 2007
G. Selimis   +4 more
semanticscholar   +1 more source

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Fast Software Encryption Workshop, 2003
N. Ferguson   +5 more
semanticscholar   +1 more source

A Primer on Cryptographic Primitives and Security Attacks

2018
This chapter aims to: (1) Provide a summary of the existing security attacks; (2) Explain the existing cryptographic primitives used as the building blocks of security defence mechanisms; (3) Explain the forces driving the development of hardware-based security solutions; (4) Introduce the physically ...
openaire   +2 more sources

Implementation of Cryptographic Primitives

International Journal of Engineering Trends and Technology, 2017
Chester Rebeiro, Shreya Rajkumar
openaire   +2 more sources

Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

ACS Nano, 2017
Abdullah Alharbi   +3 more
semanticscholar   +1 more source

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

Conference on Computer and Communications Security, 2016
J. Schneider   +3 more
semanticscholar   +1 more source

From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes

International Conference on Biomedical Engineering and Biotechnology, 2017
F. Özkaynak
semanticscholar   +1 more source

TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH

IACR Cryptology ePrint Archive, 2023
Arthur Lazzaretti   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy