Results 251 to 260 of about 380,993 (266)
Some of the next articles are maybe not open access.
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
Fast Software Encryption Workshop, 2003N. Ferguson +5 more
semanticscholar +1 more source
A Primer on Cryptographic Primitives and Security Attacks
2018This chapter aims to: (1) Provide a summary of the existing security attacks; (2) Explain the existing cryptographic primitives used as the building blocks of security defence mechanisms; (3) Explain the forces driving the development of hardware-based security solutions; (4) Introduce the physically ...
openaire +2 more sources
Implementation of Cryptographic Primitives
International Journal of Engineering Trends and Technology, 2017Chester Rebeiro, Shreya Rajkumar
openaire +2 more sources
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Cryptography and Security, 2012U. Rührmair
semanticscholar +1 more source
Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.
ACS Nano, 2017Abdullah Alharbi +3 more
semanticscholar +1 more source
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Journal of Cryptology, 2017Sam Kim, David J. Wu
semanticscholar +1 more source
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments
Conference on Computer and Communications Security, 2016J. Schneider +3 more
semanticscholar +1 more source
From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes
International Conference on Biomedical Engineering and Biotechnology, 2017F. Özkaynak
semanticscholar +1 more source
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH
IACR Cryptology ePrint Archive, 2023Arthur Lazzaretti +1 more
semanticscholar +1 more source

