Results 21 to 30 of about 388,006 (269)

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship, 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message ...
Muhammad Rehan Anwar   +2 more
doaj   +1 more source

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

open access: yesETRI Journal, 2023
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh   +3 more
doaj   +1 more source

Feebly secure cryptographic primitives [PDF]

open access: yesJournal of Mathematical Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hirsch, E. A.   +2 more
openaire   +1 more source

Experimental cheat-sensitive quantum weak coin flipping

open access: yesNature Communications, 2023
Quantum-enhanced versions of weak coin flipping (a cryptographic primitive where two mistrustful parties agree on a random bit while favouring opposite outcomes) have been proposed in the past but never realised.
Simon Neves   +5 more
doaj   +1 more source

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

open access: yesIEEE Access, 2022
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj   +1 more source

Locating Side Channel Leakage in Time through Matched Filters

open access: yesCryptography, 2022
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices.
Alessandro Barenghi   +2 more
doaj   +1 more source

Homomorphic signcryption with public plaintext‐result checkability

open access: yesIET Information Security, 2021
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li   +3 more
doaj   +1 more source

Enhanced Matrix Power Function for Cryptographic Primitive Construction

open access: yesSymmetry, 2018
A new enhanced matrix power function (MPF) is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. The
E. Sakalauskas
semanticscholar   +1 more source

A new method for solving the elliptic curve discrete logarithm problem [PDF]

open access: yesGroups, Complexity, Cryptology, 2021
The elliptic curve discrete logarithm problem is considered a secure cryptographic primitive. The purpose of this paper is to propose a paradigm shift in attacking the elliptic curve discrete logarithm problem.
Ansari Abdullah   +2 more
doaj   +1 more source

Key Assignment Scheme with Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones.
Suyash Kandele, Souradyuti Paul
doaj   +1 more source

Home - About - Disclaimer - Privacy