Results 21 to 30 of about 384,292 (296)

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware

open access: bronzeWorkshop on Cryptographic Hardware and Embedded Systems, 2010
Stéphane Badel   +7 more
openalex   +2 more sources

Cryptographic primitives based on compact knapsack problem [PDF]

open access: greenJournal of Information Security and Applications
In the present paper, we extend previous results of an id scheme based on compact knapsack problem defined by one equation. We present a sound three-move id scheme based on compact knapsack problem defined by an integer matrix. We study this problem by providing attacks based on lattices.
Georgios Rizos   +1 more
openalex   +3 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Linear Complexity of Hidden Weighted Bit Functions [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Boolean functions are crucial primitive in block cipher and are also used to design pseudorandom sequences. They play a crucial role in the design of symmetric cryptography and its analysis, and the study on the cryptographic properties of Boolean ...
CHEN Zhiru, FENG Ligang, ZHU Youwen
doaj   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, EarlyView., 2022
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, Volume 17, Issue 1, Page 66-79, January 2023., 2023
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee   +3 more
wiley   +1 more source

Improved integral cryptanalysis of SPNbox in digital rights management systems

open access: yesIET Information Security, Volume 17, Issue 1, Page 147-158, January 2023., 2023
Abstract As an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. To address the threat of key exposure, applying white‐box ciphers is effective to provide a security guarantee for digital rights management systems.
Jun Liu   +4 more
wiley   +1 more source

Improved lattice‐based mix‐nets for electronic voting

open access: yesIET Information Security, Volume 17, Issue 1, Page 18-34, January 2023., 2023
Abstract Mix‐networks were first proposed by Chaum in the late 1970s–early 1980s as a general tool for building anonymous communication systems. Classical mix‐net implementations rely on standard public key primitives (e.g., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built.
Valeh Farzaliyev   +2 more
wiley   +1 more source

Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange

open access: yesIET Information Security, Volume 17, Issue 1, Page 3-17, January 2023., 2023
Abstract Password‐authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys.
Peixin Ren, Xiaozhuo Gu, Ziliang Wang
wiley   +1 more source

‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle

open access: yesThe Modern Law Review, Volume 86, Issue 1, Page 31-66, January 2023., 2023
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley   +1 more source

Home - About - Disclaimer - Privacy