Results 21 to 30 of about 21,314 (180)

APTE: An Algorithm for Proving Trace Equivalence [PDF]

open access: yes, 2014
This paper presents APTE, a new tool for automatically proving the security of cryptographic protocols. It focuses on proving trace equivalence between processes, which is crucial for specifying privacy type properties such as anonymity and unlinkability.
B. Blanchet   +5 more
core   +1 more source

Cryptanalysis of a Pairing-free Certificateless Signcryption scheme

open access: yesICT Express, 2021
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confidentiality in an efficient manner. We cryptanalyze the signcryption scheme of Wei and Ma (2019) which is claimed to be secure.
Philemon Kasyoka   +2 more
doaj   +1 more source

New number-theoretic cryptographic primitives [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Marc Joye   +3 more
openaire   +3 more sources

A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System

open access: yesIEEE Access, 2019
Substitution permutation network (SP-network) is a chain of linked mathematical primitives used in block cipher algorithms. The proposed novel design of cryptographic SP-network consists of three cryptographic primitives: substitution box, permutation ...
Muhammad Fahad Khan   +3 more
doaj   +1 more source

Key Assignment Scheme with Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones.
Suyash Kandele, Souradyuti Paul
doaj   +1 more source

Towards Isogeny-Based Password-Authenticated Key Establishment

open access: yesJournal of Mathematical Cryptology, 2020
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg   +3 more
doaj   +1 more source

A device-independent protocol for XOR oblivious transfer [PDF]

open access: yesQuantum, 2022
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them. Ideally, Alice should not learn Bob's desired function choice and Bob should not learn any more than what is logically implied by the ...
Srijita Kundu   +2 more
doaj   +1 more source

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen   +2 more
doaj   +1 more source

Multipurpose Cryptographic Primitive ARMADILLO3 [PDF]

open access: yes, 2013
This paper describes a new design of the multipurpose cryptographic primitive ARMADILLO3 and analyses its security. The ARMADILLO3 family is oriented on small hardware such as smart cards and RFID chips. The original design ARMADILLO and its variants were analyzed by Sepehrdad et al.
Serge Vaudenay, Petr Sušil
openaire   +2 more sources

Uncloneable Cryptographic Primitives with Interaction

open access: yes, 2023
44 pages, 3 ...
Broadbent, Anne, Culf, Eric
openaire   +2 more sources

Home - About - Disclaimer - Privacy