Results 31 to 40 of about 384,292 (296)

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive

open access: bronzeInternational Conference on Applied Cryptography and Network Security, 2006
Chetan Nanjunda Mathur   +2 more
openalex   +2 more sources

New number-theoretic cryptographic primitives [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
AbstractThis paper introduces new prq-based one-way functions and companion signature schemes. The new signature schemes are interesting because they do not belong to the two common design blueprints, which are the inversion of a trapdoor permutation and the Fiat–Shamir transform.
Brier, Éric   +3 more
openaire   +4 more sources

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

open access: yesETRI Journal, 2023
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh   +3 more
doaj   +1 more source

A new method for solving the elliptic curve discrete logarithm problem [PDF]

open access: yesGroups, Complexity, Cryptology, 2021
The elliptic curve discrete logarithm problem is considered a secure cryptographic primitive. The purpose of this paper is to propose a paradigm shift in attacking the elliptic curve discrete logarithm problem.
Ansari Abdullah   +2 more
doaj   +1 more source

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

open access: yesIEEE Access, 2022
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj   +1 more source

Locating Side Channel Leakage in Time through Matched Filters

open access: yesCryptography, 2022
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices.
Alessandro Barenghi   +2 more
doaj   +1 more source

Homomorphic signcryption with public plaintext‐result checkability

open access: yesIET Information Security, 2021
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li   +3 more
doaj   +1 more source

Feebly secure cryptographic primitives [PDF]

open access: yesJournal of Mathematical Sciences, 2012
In 1992, A. Hiltgen provided first construction of provably (slightly) secure cryptographic primitives, namely, feebly one-way functions. These functions are provably harder to invert than to compute, but the complexity (viewed as the circuit complexity over circuits with arbitrary binary gates) is amplified only by a constant factor (in Hiltgen’s ...
Edward A. Hirsch   +2 more
openaire   +1 more source

A device-independent protocol for XOR oblivious transfer [PDF]

open access: yesQuantum, 2022
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them. Ideally, Alice should not learn Bob's desired function choice and Bob should not learn any more than what is logically implied by the ...
Srijita Kundu   +2 more
doaj   +1 more source

Towards Isogeny-Based Password-Authenticated Key Establishment

open access: yesJournal of Mathematical Cryptology, 2020
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy